Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MQNT.exe

Overview

General Information

Sample name:MQNT.exe
Analysis ID:1592723
MD5:27f5aa99c8e512ca56c2a46fb0b7be6b
SHA1:65a1336c182612c091ef925d52477639c7735d01
SHA256:575d39610e80fff09fc08eb068983bd0524bd2ef9508607be2749620150ddc85
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Yara detected aPLib compressed binary
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • MQNT.exe (PID: 7032 cmdline: "C:\Users\user\Desktop\MQNT.exe" MD5: 27F5AA99C8E512CA56C2A46FB0B7BE6B)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
MQNT.exeJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\Desktop\update.exeCN_Honker_WordpressScannerSample from CN Honker Pentest Toolset - file WordpressScanner.exeFlorian Roth
    • 0xd571c:$s0: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
    • 0xe8368:$s1: (http://www.eyuyan.com)
    • 0xcbd6c:$s2: GetConnectString
    • 0xe2cd4:$s4: #if !defined(AFX_RESOURCE_DLL) || defined(AFX_TARG_CHS)
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000000.00000000.2052285705.00000000006CD000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        Process Memory Space: MQNT.exe PID: 7032JoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.MQNT.exe.71faeb.2.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.MQNT.exe.6e9d0f.1.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.MQNT.exe.71faeb.3.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                0.0.MQNT.exe.6e9d0f.3.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                  0.2.MQNT.exe.400000.0.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2025-01-16T13:24:02.272126+010020283713Unknown Traffic192.168.2.549704103.235.46.96443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: http://47.92.98.180:88/MQNT/MQNT.exeAvira URL Cloud: Label: malware
                    Source: C:\Users\user\Desktop\update.exeReversingLabs: Detection: 50%
                    Source: MQNT.exeVirustotal: Detection: 65%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Users\user\Desktop\update.exeJoe Sandbox ML: detected
                    Source: MQNT.exeJoe Sandbox ML: detected
                    Source: MQNT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 103.235.46.96:443 -> 192.168.2.5:49704 version: TLS 1.2
                    Source: global trafficTCP traffic: 192.168.2.5:49732 -> 162.159.36.2:53
                    Source: Joe Sandbox ViewIP Address: 103.235.46.96 103.235.46.96
                    Source: Joe Sandbox ViewIP Address: 103.235.46.96 103.235.46.96
                    Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                    Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49704 -> 103.235.46.96:443
                    Source: global trafficHTTP traffic detected: HEAD / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AliveAccept: text/html, application/xhtml+xml, */*Accept-Encoding: identityAccept-Language: zh-cnUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)Host: www.baidu.com
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficDNS traffic detected: DNS query: www.baidu.com
                    Source: global trafficDNS traffic detected: DNS query: 18.31.95.13.in-addr.arpa
                    Source: MQNT.exeString found in binary or memory: http://47.92.98.180:18081/myauth/web/getUserCount?skey=c0ecd8de-75e7-47a6-a22b-8adedbf78780&apikey=c
                    Source: update.exe.0.drString found in binary or memory: http://47.92.98.180:88/MQNT/GX_RZ.txt
                    Source: MQNT.exeString found in binary or memory: http://47.92.98.180:88/MQNT/MQNT.exe
                    Source: MQNT.exe, update.exe.0.drString found in binary or memory: http://47.92.98.180:88/MQNT/data.txt
                    Source: MQNT.exeString found in binary or memory: http://ip-api.com/json/?lang=zh-CN
                    Source: MQNT.exeString found in binary or memory: http://q1.qlogo.cn/g?b=qq&nk=
                    Source: MQNT.exeString found in binary or memory: http://whois.pconline.com.cn/ipJson.jsp?json=true
                    Source: MQNT.exeString found in binary or memory: http://www.eyuyan.com
                    Source: MQNT.exe, update.exe.0.drString found in binary or memory: http://www.eyuyan.com)DVarFileInfo$
                    Source: MQNT.exeString found in binary or memory: http://www.eyuyan.comservice
                    Source: MQNT.exeString found in binary or memory: http://www.ibsensoftware.com/
                    Source: MQNT.exeString found in binary or memory: http://www.ip138.com
                    Source: MQNT.exeString found in binary or memory: http://www.ip138.comUser-Agent:
                    Source: MQNT.exeString found in binary or memory: https://api.ip.sb/ip
                    Source: MQNT.exeString found in binary or memory: https://cdid.c-ctrip.com/model-poc2/h
                    Source: MQNT.exeString found in binary or memory: https://cdid.c-ctrip.com/model-poc2/hhttps://ip.cn/api/index?ip=&type=0User-Agent:
                    Source: MQNT.exeString found in binary or memory: https://club.vip.qq.com/api/aggregation?g_tk=
                    Source: MQNT.exeString found in binary or memory: https://club.vip.qq.com/api/aggregation?g_tk=content-type:
                    Source: MQNT.exeString found in binary or memory: https://ip.cn/api/index?ip=&type=0
                    Source: MQNT.exeString found in binary or memory: https://ipinfo.io/json
                    Source: MQNT.exeString found in binary or memory: https://www.baidu.com
                    Source: MQNT.exeString found in binary or memory: https://www.baidu.comDate:KB3140245/
                    Source: MQNT.exeString found in binary or memory: https://www.uc.cn/ip
                    Source: MQNT.exeString found in binary or memory: https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownHTTPS traffic detected: 103.235.46.96:443 -> 192.168.2.5:49704 version: TLS 1.2

                    System Summary

                    barindex
                    Source: C:\Users\user\Desktop\update.exe, type: DROPPEDMatched rule: Sample from CN Honker Pentest Toolset - file WordpressScanner.exe Author: Florian Roth
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00411D24: CreateFileA,DeviceIoControl,CloseHandle,0_2_00411D24
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_004179220_2_00417922
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00462BA20_2_00462BA2
                    Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\update.exe 0C274B149400E89EBC0F6335A9181005B4249CABEFA8EC8B47C1D56710B2D3EF
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: String function: 00401080 appears 59 times
                    Source: MQNT.exe, 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXY.HWSS.dllf# vs MQNT.exe
                    Source: MQNT.exe, 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamexy.WSS.HTTPS.dllp( vs MQNT.exe
                    Source: MQNT.exeBinary or memory string: OriginalFilenameXY.HWSS.dllf# vs MQNT.exe
                    Source: MQNT.exeBinary or memory string: OriginalFilenamexy.WSS.HTTPS.dllp( vs MQNT.exe
                    Source: MQNT.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: C:\Users\user\Desktop\update.exe, type: DROPPEDMatched rule: CN_Honker_WordpressScanner date = 2015-06-23, author = Florian Roth, description = Sample from CN Honker Pentest Toolset - file WordpressScanner.exe, score = 0b3c5015ba3616cbc616fc9ba805fea73e98bc83, reference = Disclosed CN Honker Pentest Toolset, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: classification engineClassification label: mal88.evad.winEXE@1/3@2/1
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00401B6D CreateToolhelp32Snapshot,Module32First,0_2_00401B6D
                    Source: C:\Users\user\Desktop\MQNT.exeFile created: C:\Users\user\Desktop\update.exeJump to behavior
                    Source: MQNT.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\MQNT.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: MQNT.exeVirustotal: Detection: 65%
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: msvfw32.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: avifil32.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: winmmbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: duser.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: xmllite.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: atlthunk.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: textshaping.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: textinputframework.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: coreuicomponents.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: coremessaging.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeFile written: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: MQNT.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                    Source: MQNT.exeStatic file information: File size 5524480 > 1048576
                    Source: MQNT.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1e3800
                    Source: MQNT.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x32f400

                    Data Obfuscation

                    barindex
                    Source: Yara matchFile source: MQNT.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.MQNT.exe.71faeb.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MQNT.exe.6e9d0f.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MQNT.exe.71faeb.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.MQNT.exe.6e9d0f.3.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.MQNT.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.0.MQNT.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2052285705.00000000006CD000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: MQNT.exe PID: 7032, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_005C28F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005C28F0
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_005B6920 push eax; ret 0_2_005B694E
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_005B8E18 push eax; ret 0_2_005B8E36
                    Source: C:\Users\user\Desktop\MQNT.exeFile created: C:\Users\user\Desktop\update.exeJump to dropped file
                    Source: C:\Users\user\Desktop\MQNT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeDropped PE file which has not been started: C:\Users\user\Desktop\update.exeJump to dropped file
                    Source: C:\Users\user\Desktop\MQNT.exe TID: 2972Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeFile opened: PhysicalDrive0Jump to behavior
                    Source: MQNT.exe, 00000000.00000002.2117310347.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000003.2071390426.0000000000CAC000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000003.2114799320.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000003.2082746130.0000000000CA1000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000003.2114465348.0000000000CA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWBS1)
                    Source: MQNT.exe, 00000000.00000002.2117054668.0000000000BFE000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000002.2117310347.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000003.2071390426.0000000000CAC000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000003.2114799320.0000000000CA8000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000003.2082746130.0000000000CA1000.00000004.00000020.00020000.00000000.sdmp, MQNT.exe, 00000000.00000003.2114465348.0000000000CA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_005C28F0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005C28F0
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00433142 mov ebx, dword ptr fs:[00000030h]0_2_00433142
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00435217 mov ebx, dword ptr fs:[00000030h]0_2_00435217
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00409A24 mov ebx, dword ptr fs:[00000030h]0_2_00409A24
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00422225 mov ebx, dword ptr fs:[00000030h]0_2_00422225
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00421E1E mov ebx, dword ptr fs:[00000030h]0_2_00421E1E
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_0046B2DC HeapAlloc,RtlFreeHeap,GetProcessHeap,HeapReAlloc,0_2_0046B2DC
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_00411C79 cpuid 0_2_00411C79
                    Source: C:\Users\user\Desktop\MQNT.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\MQNT.exeCode function: 0_2_005BB17C GetVersionExA,GetEnvironmentVariableA,GetModuleFileNameA,0_2_005BB17C
                    Source: C:\Users\user\Desktop\MQNT.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                    Native API
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Masquerading
                    OS Credential Dumping121
                    Security Software Discovery
                    Remote Services1
                    Archive Collected Data
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
                    Virtualization/Sandbox Evasion
                    LSASS Memory2
                    Virtualization/Sandbox Evasion
                    Remote Desktop ProtocolData from Removable Media1
                    Non-Application Layer Protocol
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin SharesData from Network Shared Drive12
                    Application Layer Protocol
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                    Obfuscated Files or Information
                    NTDS2
                    File and Directory Discovery
                    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets33
                    System Information Discovery
                    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    MQNT.exe65%VirustotalBrowse
                    MQNT.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\Desktop\update.exe100%Joe Sandbox ML
                    C:\Users\user\Desktop\update.exe50%ReversingLabs
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://www.ip138.comUser-Agent:0%Avira URL Cloudsafe
                    http://47.92.98.180:88/MQNT/GX_RZ.txt0%Avira URL Cloudsafe
                    http://www.eyuyan.comservice0%Avira URL Cloudsafe
                    http://47.92.98.180:88/MQNT/data.txt0%Avira URL Cloudsafe
                    http://47.92.98.180:88/MQNT/MQNT.exe100%Avira URL Cloudmalware
                    https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonip0%Avira URL Cloudsafe
                    https://www.baidu.comDate:KB3140245/0%Avira URL Cloudsafe
                    http://www.eyuyan.com0%Avira URL Cloudsafe
                    https://www.uc.cn/ip0%Avira URL Cloudsafe
                    http://47.92.98.180:18081/myauth/web/getUserCount?skey=c0ecd8de-75e7-47a6-a22b-8adedbf78780&apikey=c0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    www.wshifen.com
                    103.235.46.96
                    truefalse
                      high
                      18.31.95.13.in-addr.arpa
                      unknown
                      unknownfalse
                        high
                        www.baidu.com
                        unknown
                        unknownfalse
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://47.92.98.180:88/MQNT/GX_RZ.txtupdate.exe.0.drfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.eyuyan.com)DVarFileInfo$MQNT.exe, update.exe.0.drfalse
                            high
                            https://api.ip.sb/ipMQNT.exefalse
                              high
                              https://club.vip.qq.com/api/aggregation?g_tk=MQNT.exefalse
                                high
                                http://whois.pconline.com.cn/ipJson.jsp?json=trueMQNT.exefalse
                                  high
                                  http://www.ip138.comUser-Agent:MQNT.exefalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://club.vip.qq.com/api/aggregation?g_tk=content-type:MQNT.exefalse
                                    high
                                    http://www.eyuyan.comserviceMQNT.exefalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.ibsensoftware.com/MQNT.exefalse
                                      high
                                      https://cdid.c-ctrip.com/model-poc2/hMQNT.exefalse
                                        high
                                        https://cdid.c-ctrip.com/model-poc2/hhttps://ip.cn/api/index?ip=&type=0User-Agent:MQNT.exefalse
                                          high
                                          https://ipinfo.io/jsonMQNT.exefalse
                                            high
                                            https://ip.cn/api/index?ip=&type=0MQNT.exefalse
                                              high
                                              https://www.uc.cn/ipIP:https://api.ip.sb/iphttps://ipinfo.io/jsonipMQNT.exefalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://www.eyuyan.comMQNT.exefalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              http://ip-api.com/json/?lang=zh-CNMQNT.exefalse
                                                high
                                                https://www.baidu.comDate:KB3140245/MQNT.exefalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://47.92.98.180:88/MQNT/MQNT.exeMQNT.exetrue
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://47.92.98.180:88/MQNT/data.txtMQNT.exe, update.exe.0.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://q1.qlogo.cn/g?b=qq&nk=MQNT.exefalse
                                                  high
                                                  https://www.uc.cn/ipMQNT.exefalse
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  http://www.ip138.comMQNT.exefalse
                                                    high
                                                    http://47.92.98.180:18081/myauth/web/getUserCount?skey=c0ecd8de-75e7-47a6-a22b-8adedbf78780&apikey=cMQNT.exefalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    https://www.baidu.comMQNT.exefalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      103.235.46.96
                                                      www.wshifen.comHong Kong
                                                      55967BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdfalse
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1592723
                                                      Start date and time:2025-01-16 13:23:08 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 5m 10s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:6
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:MQNT.exe
                                                      Detection:MAL
                                                      Classification:mal88.evad.winEXE@1/3@2/1
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:Failed
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                                      • Excluded IPs from analysis (whitelisted): 20.190.159.23, 4.175.87.197, 13.107.246.45, 13.95.31.18
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      TimeTypeDescription
                                                      20:24:02API Interceptor1x Sleep call for process: MQNT.exe modified
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      103.235.46.96VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
                                                      • www.baidu.com/
                                                      DNF#U604b#U62180224a.exeGet hashmaliciousUnknownBrowse
                                                      • www.baidu.com/s?wd=www.cfjuzi.com&rsv_spt=1&issp=1&rsv_bp=0&ie=utf-8&tn=utf8speed_dg&inputT=453
                                                      New Al Maktoum International Airport Enquiry Ref #2401249.exeGet hashmaliciousFormBookBrowse
                                                      • www.wvufcw948o.top/pt46/?ara=runx2q514acjuuceA0OTyKdTIzcy0YcAOvUMICEfyLgC3vUfTcW2aWKxfLyo5+IB4FDn&D8V=_FNDAz
                                                      4.exeGet hashmaliciousBlackMoonBrowse
                                                      • www.baidu.com/
                                                      2.exeGet hashmaliciousBlackMoonBrowse
                                                      • www.baidu.com/
                                                      1.exeGet hashmaliciousBlackMoonBrowse
                                                      • www.baidu.com/
                                                      3.exeGet hashmaliciousBlackMoon, XRedBrowse
                                                      • www.baidu.com/
                                                      1.exeGet hashmaliciousBlackMoonBrowse
                                                      • www.baidu.com/
                                                      f1.exeGet hashmaliciousUnknownBrowse
                                                      • www.baidu.com/
                                                      SecuriteInfo.com.FileRepMalware.29184.31872.exeGet hashmaliciousUnknownBrowse
                                                      • www.baidu.com/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      www.wshifen.comhttps://imtcoken.im/Get hashmaliciousUnknownBrowse
                                                      • 103.235.47.188
                                                      http://www.toekan.im/Get hashmaliciousUnknownBrowse
                                                      • 103.235.47.188
                                                      https://wap.sunblock-pro.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.47.188
                                                      5vrRrFN56j.exeGet hashmaliciousBdaejecBrowse
                                                      • 103.235.47.188
                                                      http://m.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.47.188
                                                      https://www.xietaoz.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.47.188
                                                      http://wap.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      http://m.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.47.188
                                                      http://m.ccsurj.org/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      http://www.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      BAIDUBeijingBaiduNetcomScienceandTechnologyCoLtdchromsetup.exeGet hashmaliciousUnknownBrowse
                                                      • 185.10.104.109
                                                      https://imtcoken.im/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      http://www.toekan.im/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      https://wap.sunblock-pro.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      5vrRrFN56j.exeGet hashmaliciousBdaejecBrowse
                                                      • 103.235.47.188
                                                      http://m.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.47.188
                                                      https://www.xietaoz.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      http://wap.escritoresunidos.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      http://m.activeselfie.com/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      http://m.ccsurj.org/Get hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      a0e9f5d64349fb13191bc781f81f42e1random.exeGet hashmaliciousLummaCBrowse
                                                      • 103.235.46.96
                                                      PEN2ydG.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                      • 103.235.46.96
                                                      vXn4pan2US.exeGet hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      OC1025QPR.docx.docGet hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      CLOlOswCpi.msiGet hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      vXn4pan2US.exeGet hashmaliciousUnknownBrowse
                                                      • 103.235.46.96
                                                      8jm0z0L.exeGet hashmaliciousLummaC, PureLog StealerBrowse
                                                      • 103.235.46.96
                                                      Set-up.exeGet hashmaliciousLummaCBrowse
                                                      • 103.235.46.96
                                                      celebrationannabirthday.mp4.htaGet hashmaliciousLummaCBrowse
                                                      • 103.235.46.96
                                                      Infoblatt_Ausnahmesituation.pdf.lnkGet hashmaliciousLummaCBrowse
                                                      • 103.235.46.96
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      C:\Users\user\Desktop\update.exe5vrRrFN56j.exeGet hashmaliciousBdaejecBrowse
                                                        wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                                          wRhEMj1swo.exeGet hashmaliciousUnknownBrowse
                                                            Process:C:\Users\user\Desktop\MQNT.exe
                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                            Category:modified
                                                            Size (bytes):422
                                                            Entropy (8bit):3.9822709529024487
                                                            Encrypted:false
                                                            SSDEEP:12:QZsiL5wmHOlDmo0qmWvclLwv2G4wmL66uCEuyLyn:QCGwv4o0BlLweTL66uuyW
                                                            MD5:12848C48DA8097C0879B053388DFBAA3
                                                            SHA1:EDA6082B0982F73B9AEF2FABA3F867BE30EC04C9
                                                            SHA-256:2573DC5A90C39667074D2CEB4F18DA5F4713708B6CF6A52D0675707A222D392F
                                                            SHA-512:C9CFFDA09CB896665BFE70F238E3F5727AB8B12F4BDDA78137A39065D769BB9F7A5022300D9E0BCD5710FFC0376983FCE29876294F4D9A2C382ACBC7EBEEEDBE
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.D.o.c.u.m.e.n.t.s.\.1.9.C.A.D.7.2.1.B.5.9.B.0.9.B.2.0.8.B.5.A.7.E.2.F.6.3.8.7.8.4.3...i.c.o.....I.n.f.o.T.i.p.=.....Q............. ............. .................Q.Q.........................
                                                            Process:C:\Users\user\Desktop\MQNT.exe
                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Category:dropped
                                                            Size (bytes):954368
                                                            Entropy (8bit):6.344965617584001
                                                            Encrypted:false
                                                            SSDEEP:24576:YvtI2D6CEhvugYa3EZfup4jflORg0RBQI:YevLEZ7cRg0RJ
                                                            MD5:8A619EBB79546DD4487F312B9C57934F
                                                            SHA1:6986759E032DB2694D625C85EC5C8B4AD74A689B
                                                            SHA-256:0C274B149400E89EBC0F6335A9181005B4249CABEFA8EC8B47C1D56710B2D3EF
                                                            SHA-512:AB29923B35AA1D21813F9D6B012979385F7C4B161FEE51C28A4987768B93297C81E88EAA969B9F491F0A359FD18F3515CC19C694ABD95413A575053C5BA29C7B
                                                            Malicious:true
                                                            Yara Hits:
                                                            • Rule: CN_Honker_WordpressScanner, Description: Sample from CN Honker Pentest Toolset - file WordpressScanner.exe, Source: C:\Users\user\Desktop\update.exe, Author: Florian Roth
                                                            Antivirus:
                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                            • Antivirus: ReversingLabs, Detection: 50%
                                                            Joe Sandbox View:
                                                            • Filename: 5vrRrFN56j.exe, Detection: malicious, Browse
                                                            • Filename: wRhEMj1swo.exe, Detection: malicious, Browse
                                                            • Filename: wRhEMj1swo.exe, Detection: malicious, Browse
                                                            Reputation:low
                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......p.-.4.C.4.C.4.C.[.H.=.C.[.I.2.C...M...C.O.O.1.C.b.P...C.V.P.(.C.4.B...C.....7.C...H.E.C...I..C..H.W.C..I./.C.4.C.m.C..E.5.C.Rich4.C.........................PE..L.....|g.........................................@..........................................................................Q..,....0...e..............................................................................0............................text...n........................... ..`.rdata.............................@..@.data...j...........................@....rsrc....e...0...p... ..............@..@................................................................................................................................................................................................................................................................................................................
                                                            Process:C:\Users\user\Desktop\MQNT.exe
                                                            File Type:MS Windows icon resource - 1 icon, -128x-128, 32 bits/pixel
                                                            Category:dropped
                                                            Size (bytes):67646
                                                            Entropy (8bit):5.7039139970238075
                                                            Encrypted:false
                                                            SSDEEP:1536:vrpcQaRJlr5a3QEC2ADfYVmqpPZf++r7MJsEzlDtr66Evbag:vrpcQaGHVmOhf++razdtYp
                                                            MD5:19CAD721B59B09B208B5A7E2F6387843
                                                            SHA1:7AB6F085A11E86D5514E182BF0DF1C96723C8901
                                                            SHA-256:F9DFF22EF297227202F34343DA1BA9585F843B3AA0834B1074F273C9D9542252
                                                            SHA-512:E6DB461CB85A7B4C9F44019678E49562B68B820FFF6F0EE82A7533F710858C7AA7DF72FE57E4FE0A6A8291C33AAD819C5DCD7B75F9A55CFF12AF12344A555E81
                                                            Malicious:false
                                                            Reputation:low
                                                            Preview:............ .(.......(............. .................................................200.............................................. ...! ..! ..! ..$!..$!..$"..%#..&#..&#..'$..'$..(%.!(%.&+).),*.,-+.,-+.),*.*-+.,-+.-.,.+.,.+.,.-.,.-.,.-.,.,-+.*,,.(-,.(-,.'-,.'-,.'-,.&.-.'/..)/..)/..+32.+32.-32.-32.+33.+33.-32.-32..43..43..31..31..31..31..31./42.-41.+2/.*/-.+0..+2/.+2/.-0..).,.(-+.'.+.'.+.'.+.(-+.'.+.(/,.&/,.(/,.(/,.(/,.(/,.(/,.(/,.(/,.&/,.#,).!,). +(..*'..(%..'$..%"..%"..&$..&$..$#..#"..#".."!.." .." .........................................PRR.............................................#%&.............................................. ..!!..!!..#!..$"..&$..%#..'$..&$..(%..'%..(&..(&..)'.!,*.$,+.%-,.%-,.%-,.%-,.&.-.'/..'20.(31.*21.*21.*21.+32.)33.)33.*44.(44.)55.)55.)55.)55.*66.+77.)55.)55.)55.)55.)55.)55.)55.)55.-77.-86.-86.-86.-86.-86.-86.-86.,75.+64.)42.(31.+64.+64.+32.(31.)42.'42.'42.'42.'42.'42.'42.&42.#0..#0..#0.."/-."/-.!.,.!.,.!.,..-+...+..,*..,)..*(..)&..'%..&$..%#..%$..$
                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                            Entropy (8bit):7.076698191150393
                                                            TrID:
                                                            • Win32 Executable (generic) a (10002005/4) 99.26%
                                                            • UPX compressed Win32 Executable (30571/9) 0.30%
                                                            • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                            • Windows Screen Saver (13104/52) 0.13%
                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                            File name:MQNT.exe
                                                            File size:5'524'480 bytes
                                                            MD5:27f5aa99c8e512ca56c2a46fb0b7be6b
                                                            SHA1:65a1336c182612c091ef925d52477639c7735d01
                                                            SHA256:575d39610e80fff09fc08eb068983bd0524bd2ef9508607be2749620150ddc85
                                                            SHA512:f8754cb9c4b2f3ad266376da59765153c61c48b712ea0dafa41775e1504e6254ba67d7ac65690576a49667feb5a31bc5fe800e198607edfa5cc430d3f612f7a4
                                                            SSDEEP:98304:5q+ZcUWX+lbbEipLaUTEZ7ce0R252Pw8B4DuR/6JBAUZLc:5q+ZcUWX+/yV0R2YPxoaiJVA
                                                            TLSH:1146C013F142C0B2E5160BB021B2573DAA799F515E74C983EBE4FEB9BC33162976610E
                                                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...........D.}ID.}ID.}I+.vIM.}I+.wIB.}I?.qIA.}I..nIh.}I.. IF.}I..sIh.}ID.|I..}I&.nI[.}IM..IE.}I..oIN.}Ir.vI..}Ir.wI..}I..vI*.}I..wIt.}
                                                            Icon Hash:2731d28aae6e218f
                                                            Entrypoint:0x5b5320
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                            DLL Characteristics:
                                                            Time Stamp:0x6787A62E [Wed Jan 15 12:12:30 2025 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:2bbe6c36c6f18214d3400bb75b6c0bf1
                                                            Instruction
                                                            push ebp
                                                            mov ebp, esp
                                                            push FFFFFFFFh
                                                            push 0083FE38h
                                                            push 005B8284h
                                                            mov eax, dword ptr fs:[00000000h]
                                                            push eax
                                                            mov dword ptr fs:[00000000h], esp
                                                            sub esp, 58h
                                                            push ebx
                                                            push esi
                                                            push edi
                                                            mov dword ptr [ebp-18h], esp
                                                            call dword ptr [005E51C8h]
                                                            xor edx, edx
                                                            mov dl, ah
                                                            mov dword ptr [0099B1D4h], edx
                                                            mov ecx, eax
                                                            and ecx, 000000FFh
                                                            mov dword ptr [0099B1D0h], ecx
                                                            shl ecx, 08h
                                                            add ecx, edx
                                                            mov dword ptr [0099B1CCh], ecx
                                                            shr eax, 10h
                                                            mov dword ptr [0099B1C8h], eax
                                                            push 00000001h
                                                            call 00007F08E0B5BA7Bh
                                                            pop ecx
                                                            test eax, eax
                                                            jne 00007F08E0B55B3Ah
                                                            push 0000001Ch
                                                            call 00007F08E0B55BF8h
                                                            pop ecx
                                                            call 00007F08E0B5B826h
                                                            test eax, eax
                                                            jne 00007F08E0B55B3Ah
                                                            push 00000010h
                                                            call 00007F08E0B55BE7h
                                                            pop ecx
                                                            xor esi, esi
                                                            mov dword ptr [ebp-04h], esi
                                                            call 00007F08E0B5B654h
                                                            call dword ptr [005E53F4h]
                                                            mov dword ptr [009A0444h], eax
                                                            call 00007F08E0B5B512h
                                                            mov dword ptr [0099B140h], eax
                                                            call 00007F08E0B5B2BBh
                                                            call 00007F08E0B5B1FDh
                                                            call 00007F08E0B590AEh
                                                            mov dword ptr [ebp-30h], esi
                                                            lea eax, dword ptr [ebp-5Ch]
                                                            push eax
                                                            call dword ptr [005E5260h]
                                                            call 00007F08E0B5B18Eh
                                                            mov dword ptr [ebp-64h], eax
                                                            test byte ptr [ebp-30h], 00000001h
                                                            je 00007F08E0B55B38h
                                                            movzx eax, word ptr [ebp+00h]
                                                            Programming Language:
                                                            • [ASM] VS2008 SP1 build 30729
                                                            • [C++] VS98 (6.0) SP6 build 8804
                                                            • [ C ] VS98 (6.0) SP6 build 8804
                                                            • [C++] VS98 (6.0) build 8168
                                                            • [ C ] VS98 (6.0) build 8168
                                                            • [EXP] VC++ 6.0 SP5 build 8804
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x5119f00x168.rdata
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a10000x791c.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x1e50000x810.rdata
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x10000x1e376e0x1e38001609d35bb8f2b5d4e7aefd501dd5f680False0.3852831930261117data6.388863710472058IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rdata0x1e50000x32f3980x32f400eb0eb04ac146c1a8d268c433bd07365bunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .data0x5150000x8b44a0x2a200e0e96501acb0a48ac8d7c2e58804932dFalse0.3509017989614243data5.96440390442563IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                            .rsrc0x5a10000x791c0x7a00e530300d5fc7c550178f7ba7e68665ccFalse0.44041367827868855data5.293603761108245IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            TEXTINCLUDE0x5a1d9c0xbASCII text, with no line terminatorsChineseChina1.7272727272727273
                                                            TEXTINCLUDE0x5a1da80x16dataChineseChina1.3636363636363635
                                                            TEXTINCLUDE0x5a1dc00x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
                                                            WAVE0x5a1f140x1448RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 22050 HzChineseChina0.8330123266563945
                                                            RT_CURSOR0x5a335c0x134dataChineseChina0.5811688311688312
                                                            RT_CURSOR0x5a34900x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                                                            RT_CURSOR0x5a35c40x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                                                            RT_CURSOR0x5a36f80xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                                                            RT_CURSOR0x5a37ac0x134AmigaOS bitmap font "(", fc_YSize 4294967292, 3840 elements, 2nd "\377\370\017\377\377\374\037\377\377\376?\377\377\377\177\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.32792207792207795
                                                            RT_CURSOR0x5a38e00x134AmigaOS bitmap font "(", fc_YSize 4294967288, 3840 elements, 2nd "\377\370\037\377\377\370\037\377\377\370\037\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.3246753246753247
                                                            RT_BITMAP0x5a3a140x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.3598901098901099
                                                            RT_BITMAP0x5a3b800x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
                                                            RT_BITMAP0x5a3dc80x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
                                                            RT_BITMAP0x5a3f0c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
                                                            RT_BITMAP0x5a40640x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
                                                            RT_BITMAP0x5a41bc0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
                                                            RT_BITMAP0x5a43140x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
                                                            RT_BITMAP0x5a446c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
                                                            RT_BITMAP0x5a45c40x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
                                                            RT_BITMAP0x5a471c0x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
                                                            RT_BITMAP0x5a48740x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
                                                            RT_BITMAP0x5a49cc0x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
                                                            RT_BITMAP0x5a4fb00xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                                                            RT_BITMAP0x5a50680x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
                                                            RT_BITMAP0x5a51d40x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                                                            RT_ICON0x5a53180x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                                                            RT_ICON0x5a56000x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                                                            RT_ICON0x5a57280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.5215759849906192
                                                            RT_MENU0x5a67d00xcdataChineseChina1.5
                                                            RT_MENU0x5a67dc0x284dataChineseChina0.5
                                                            RT_DIALOG0x5a6a600x98dataChineseChina0.7171052631578947
                                                            RT_DIALOG0x5a6af80x17adataChineseChina0.5185185185185185
                                                            RT_DIALOG0x5a6c740xfadataChineseChina0.696
                                                            RT_DIALOG0x5a6d700xeadataChineseChina0.6239316239316239
                                                            RT_DIALOG0x5a6e5c0x8aedataChineseChina0.39603960396039606
                                                            RT_DIALOG0x5a770c0xb2dataChineseChina0.7359550561797753
                                                            RT_DIALOG0x5a77c00xccdataChineseChina0.7647058823529411
                                                            RT_DIALOG0x5a788c0xb2dataChineseChina0.6629213483146067
                                                            RT_DIALOG0x5a79400xe2dataChineseChina0.6637168141592921
                                                            RT_DIALOG0x5a7a240x18cdataChineseChina0.5227272727272727
                                                            RT_STRING0x5a7bb00x50dataChineseChina0.85
                                                            RT_STRING0x5a7c000x2cdataChineseChina0.5909090909090909
                                                            RT_STRING0x5a7c2c0x78dataChineseChina0.925
                                                            RT_STRING0x5a7ca40x1c4dataChineseChina0.8141592920353983
                                                            RT_STRING0x5a7e680x12adataChineseChina0.5201342281879194
                                                            RT_STRING0x5a7f940x146dataChineseChina0.6288343558282209
                                                            RT_STRING0x5a80dc0x40dataChineseChina0.65625
                                                            RT_STRING0x5a811c0x64dataChineseChina0.73
                                                            RT_STRING0x5a81800x1d8dataChineseChina0.6758474576271186
                                                            RT_STRING0x5a83580x114dataChineseChina0.6376811594202898
                                                            RT_STRING0x5a846c0x24dataChineseChina0.4444444444444444
                                                            RT_GROUP_CURSOR0x5a84900x14dataChineseChina1.4
                                                            RT_GROUP_CURSOR0x5a84a40x14dataChineseChina1.4
                                                            RT_GROUP_CURSOR0x5a84b80x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                            RT_GROUP_CURSOR0x5a84cc0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                                            RT_GROUP_CURSOR0x5a84e00x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                                                            RT_GROUP_ICON0x5a85040x14data1.2
                                                            RT_GROUP_ICON0x5a85180x14dataChineseChina1.2
                                                            RT_GROUP_ICON0x5a852c0x14dataChineseChina1.25
                                                            RT_VERSION0x5a85400x20cdataChineseChina0.5515267175572519
                                                            RT_MANIFEST0x5a874c0x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
                                                            DLLImport
                                                            MSVFW32.dllDrawDibDraw
                                                            AVIFIL32.dllAVIStreamGetFrame, AVIStreamInfoA
                                                            iphlpapi.dllGetAdaptersInfo
                                                            WINMM.dllmidiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, waveOutRestart, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, waveOutClose, midiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutGetNumDevs, PlaySoundA
                                                            WS2_32.dllinet_ntoa, WSAStartup, WSACleanup, select, send, closesocket, WSAAsyncSelect, recvfrom, ioctlsocket, recv, getpeername, accept, ntohl
                                                            RASAPI32.dllRasGetConnectStatusA, RasHangUpA
                                                            KERNEL32.dllGetVersion, FileTimeToSystemTime, TerminateThread, VirtualAlloc, VirtualFree, CreateMutexA, ReleaseMutex, SuspendThread, InterlockedIncrement, InterlockedDecrement, LocalFree, FileTimeToLocalFileTime, lstrcpynA, DuplicateHandle, FlushFileBuffers, LockFile, UnlockFile, SetEndOfFile, lstrcmpiA, GlobalDeleteAtom, GlobalFindAtomA, GlobalAddAtomA, GlobalGetAtomNameA, lstrcmpA, LocalAlloc, TlsAlloc, GlobalHandle, TlsFree, TlsSetValue, LocalReAlloc, TlsGetValue, GetFileTime, GetCurrentThread, GlobalFlags, SetErrorMode, GetProcessVersion, GetCPInfo, GetOEMCP, GetStartupInfoA, RtlUnwind, GetSystemTime, GetLocalTime, RaiseException, HeapSize, GetACP, SetStdHandle, GetFileType, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetEnvironmentVariableA, HeapDestroy, HeapCreate, SetEnvironmentVariableA, LCMapStringA, LCMapStringW, IsBadWritePtr, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, SetLastError, GetSystemDirectoryA, GetWindowsDirectoryA, TerminateProcess, GetCurrentProcess, GetFileSize, SetFilePointer, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, lstrlenW, RemoveDirectoryA, GetModuleFileNameA, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, MultiByteToWideChar, WideCharToMultiByte, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, GlobalAlloc, GlobalLock, GlobalUnlock, GetTempPathA, FindFirstFileA, FindClose, SetFileAttributesA, GetFileAttributesA, MoveFileA, DeleteFileA, CopyFileA, CreateDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, SetLocalTime, GetCommandLineA, GetTickCount, WaitForSingleObject, CloseHandle, InterlockedExchange, GetTimeZoneInformation
                                                            USER32.dllGetSysColorBrush, GetMenuCheckMarkDimensions, GetMenuState, SetMenuItemBitmaps, CheckMenuItem, MoveWindow, IsDialogMessageA, ScrollWindowEx, SendDlgItemMessageA, MapWindowPoints, AdjustWindowRectEx, GetScrollPos, RegisterClassA, GetMenuItemCount, GetMenuItemID, SetWindowsHookExA, CallNextHookEx, GetClassLongA, SetPropA, UnhookWindowsHookEx, GetPropA, RemovePropA, GetMessageTime, GetLastActivePopup, RegisterWindowMessageA, GetWindowPlacement, EndDialog, CreateDialogIndirectParamA, DestroyWindow, GrayStringA, DrawTextA, TabbedTextOutA, EndPaint, BeginPaint, GetWindowDC, CharUpperA, GetWindowTextLengthA, SetWindowTextA, GetForegroundWindow, UnregisterHotKey, RegisterHotKey, CreateWindowExA, CallWindowProcA, GetWindowTextA, GetDlgItem, GetClassNameA, GetDesktopWindow, DrawStateA, FrameRect, GetNextDlgTabItem, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, RegisterClipboardFormatA, CreateIconFromResourceEx, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, DestroyIcon, PtInRect, OffsetRect, IsWindowVisible, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, ReleaseDC, IsChild, TrackPopupMenu, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, LoadStringA, CreateIconFromResource, IntersectRect, UnregisterClassA
                                                            GDI32.dllCreateSolidBrush, FillRgn, CreateRectRgn, CombineRgn, PatBlt, CreatePen, SelectObject, CreatePatternBrush, CreateBitmap, CreateDCA, CreateCompatibleBitmap, GetPolyFillMode, GetStretchBltMode, GetROP2, GetBkColor, GetBkMode, GetTextColor, CreateRoundRectRgn, CreateEllipticRgn, PathToRegion, EndPath, BeginPath, GetWindowOrgEx, GetViewportOrgEx, GetWindowExtEx, TranslateCharsetInfo, SaveDC, RestoreDC, SetROP2, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowOrgEx, SetWindowExtEx, ScaleWindowExtEx, GetClipBox, ExcludeClipRect, MoveToEx, CreateFontIndirectA, ExtSelectClipRgn, GetViewportExtEx, PtVisible, RectVisible, ExtTextOutA, Escape, GetTextMetricsA, SetDIBitsToDevice, SetTextColor, SetBkMode, TextOutA, SetBkColor, CreateRectRgnIndirect, CreateDIBSection, SetStretchBltMode, GetClipRgn, CreatePolygonRgn, SelectClipRgn, DeleteObject, CreateDIBitmap, GetSystemPaletteEntries, CreatePalette, StretchBlt, SelectPalette, RealizePalette, GetDIBits, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, CreateFontA, GetStockObject, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, GetPixel, CreateCompatibleDC, GetTextExtentPoint32A, LineTo, SetPolyFillMode, GetDeviceCaps
                                                            WINSPOOL.DRVDocumentPropertiesA, ClosePrinter, OpenPrinterA
                                                            comdlg32.dllChooseColorA, ChooseFontA, GetOpenFileNameA, GetSaveFileNameA, GetFileTitleA
                                                            ADVAPI32.dllRegCreateKeyExA, RegQueryValueA, RegSetValueExA, RegOpenKeyExA, RegCloseKey
                                                            SHELL32.dllDragAcceptFiles, DragQueryFileA, ShellExecuteA, Shell_NotifyIconA, SHGetSpecialFolderPathA, DragFinish
                                                            ole32.dllCLSIDFromProgID, OleInitialize, CLSIDFromString, CoCreateInstance, OleRun, OleUninitialize
                                                            OLEAUT32.dllVariantChangeType, VariantCopy, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayGetDim, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayGetElement, VariantCopyInd, VariantClear, SysAllocString, SafeArrayDestroy, SafeArrayCreate, SafeArrayPutElement, RegisterTypeLib, LHashValOfNameSys, LoadTypeLib, UnRegisterTypeLib, VariantInit
                                                            COMCTL32.dllImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_Destroy, ImageList_Create, ImageList_BeginDrag, ImageList_DragShowNolock, _TrackMouseEvent, ImageList_SetBkColor, ImageList_GetImageCount, ImageList_EndDrag, ImageList_Read, ImageList_Duplicate, ImageList_Add
                                                            WININET.dllInternetCrackUrlA, HttpOpenRequestA, HttpSendRequestA, HttpQueryInfoA, InternetReadFile, InternetConnectA, InternetSetOptionA, InternetOpenA, InternetCloseHandle, InternetCanonicalizeUrlA
                                                            Language of compilation systemCountry where language is spokenMap
                                                            ChineseChina
                                                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                            2025-01-16T13:24:02.272126+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549704103.235.46.96443TCP
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 16, 2025 13:24:01.030925989 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:01.030977011 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:01.031116009 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:01.032244921 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:01.032268047 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.272031069 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.272125959 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:02.272161961 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.272212029 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:02.276002884 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:02.276015043 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.276453972 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.318317890 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:02.354747057 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:02.399327993 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.681462049 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.681629896 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.681797028 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:02.743047953 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:02.743047953 CET49704443192.168.2.5103.235.46.96
                                                            Jan 16, 2025 13:24:02.743079901 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:02.743093014 CET44349704103.235.46.96192.168.2.5
                                                            Jan 16, 2025 13:24:31.091870070 CET4973253192.168.2.5162.159.36.2
                                                            Jan 16, 2025 13:24:31.096692085 CET5349732162.159.36.2192.168.2.5
                                                            Jan 16, 2025 13:24:31.096791029 CET4973253192.168.2.5162.159.36.2
                                                            Jan 16, 2025 13:24:31.101697922 CET5349732162.159.36.2192.168.2.5
                                                            Jan 16, 2025 13:24:31.555143118 CET4973253192.168.2.5162.159.36.2
                                                            Jan 16, 2025 13:24:31.560211897 CET5349732162.159.36.2192.168.2.5
                                                            Jan 16, 2025 13:24:31.560291052 CET4973253192.168.2.5162.159.36.2
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Jan 16, 2025 13:24:01.019107103 CET6353153192.168.2.51.1.1.1
                                                            Jan 16, 2025 13:24:01.026106119 CET53635311.1.1.1192.168.2.5
                                                            Jan 16, 2025 13:24:31.091058016 CET5359226162.159.36.2192.168.2.5
                                                            Jan 16, 2025 13:24:31.598798037 CET5439853192.168.2.51.1.1.1
                                                            Jan 16, 2025 13:24:31.605582952 CET53543981.1.1.1192.168.2.5
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Jan 16, 2025 13:24:01.019107103 CET192.168.2.51.1.1.10x561fStandard query (0)www.baidu.comA (IP address)IN (0x0001)false
                                                            Jan 16, 2025 13:24:31.598798037 CET192.168.2.51.1.1.10x6f90Standard query (0)18.31.95.13.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Jan 16, 2025 13:24:01.026106119 CET1.1.1.1192.168.2.50x561fNo error (0)www.baidu.comwww.a.shifen.comCNAME (Canonical name)IN (0x0001)false
                                                            Jan 16, 2025 13:24:01.026106119 CET1.1.1.1192.168.2.50x561fNo error (0)www.a.shifen.comwww.wshifen.comCNAME (Canonical name)IN (0x0001)false
                                                            Jan 16, 2025 13:24:01.026106119 CET1.1.1.1192.168.2.50x561fNo error (0)www.wshifen.com103.235.46.96A (IP address)IN (0x0001)false
                                                            Jan 16, 2025 13:24:01.026106119 CET1.1.1.1192.168.2.50x561fNo error (0)www.wshifen.com103.235.47.188A (IP address)IN (0x0001)false
                                                            Jan 16, 2025 13:24:31.605582952 CET1.1.1.1192.168.2.50x6f90Name error (3)18.31.95.13.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.549704103.235.46.964437032C:\Users\user\Desktop\MQNT.exe
                                                            TimestampBytes transferredDirectionData
                                                            2025-01-16 12:24:02 UTC271OUTHEAD / HTTP/1.1
                                                            Cache-Control: no-cache
                                                            Connection: Keep-Alive
                                                            Accept: text/html, application/xhtml+xml, */*
                                                            Accept-Encoding: identity
                                                            Accept-Language: zh-cn
                                                            User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)
                                                            Host: www.baidu.com
                                                            2025-01-16 12:24:02 UTC327INHTTP/1.1 200 OK
                                                            Accept-Ranges: bytes
                                                            Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
                                                            Content-Length: 277
                                                            Content-Type: text/html
                                                            Date: Thu, 16 Jan 2025 12:24:02 GMT
                                                            Etag: "575e1f6f-115"
                                                            Last-Modified: Mon, 13 Jun 2016 02:50:23 GMT
                                                            Pragma: no-cache
                                                            Server: bfe/1.0.8.18
                                                            Connection: close


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Target ID:0
                                                            Start time:07:23:59
                                                            Start date:16/01/2025
                                                            Path:C:\Users\user\Desktop\MQNT.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\MQNT.exe"
                                                            Imagebase:0x400000
                                                            File size:5'524'480 bytes
                                                            MD5 hash:27F5AA99C8E512CA56C2A46FB0B7BE6B
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000000.2052285705.00000000006CD000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:true

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:3%
                                                              Dynamic/Decrypted Code Coverage:0%
                                                              Signature Coverage:0.5%
                                                              Total number of Nodes:185
                                                              Total number of Limit Nodes:16
                                                              execution_graph 63121 5b6b3e 63122 5b6c18 63121->63122 63123 5b6b6c 63121->63123 63124 5b6bb1 63123->63124 63125 5b6b76 63123->63125 63127 5b6ba2 63124->63127 63141 5bd984 29 API calls 63124->63141 63138 5bd984 29 API calls 63125->63138 63127->63122 63129 5b6c0a RtlFreeHeap 63127->63129 63129->63122 63130 5b6bbd 63133 5b6be9 63130->63133 63142 5bf94f VirtualFree HeapFree VirtualFree 63130->63142 63131 5b6b7d 63132 5b6b97 63131->63132 63139 5bebc8 VirtualFree VirtualFree HeapFree 63131->63139 63140 5b6ba8 LeaveCriticalSection 63132->63140 63143 5b6c00 LeaveCriticalSection 63133->63143 63138->63131 63139->63132 63140->63127 63141->63130 63142->63133 63143->63127 63144 5b5320 GetVersion 63176 5bb2c4 HeapCreate 63144->63176 63146 5b537e 63147 5b538b 63146->63147 63148 5b5383 63146->63148 63188 5bb081 37 API calls 63147->63188 63196 5b544d 8 API calls 63148->63196 63152 5b5390 63153 5b539c 63152->63153 63154 5b5394 63152->63154 63189 5baec5 34 API calls 63153->63189 63197 5b544d 8 API calls 63154->63197 63158 5b53a6 GetCommandLineA 63190 5bad93 37 API calls 63158->63190 63160 5b53b6 63198 5bab46 49 API calls 63160->63198 63162 5b53c0 63191 5baa8d 48 API calls 63162->63191 63164 5b53c5 63165 5b53ca GetStartupInfoA 63164->63165 63192 5baa35 48 API calls 63165->63192 63167 5b53dc 63168 5b53e5 63167->63168 63169 5b53ee GetModuleHandleA 63168->63169 63193 5d06bd 63169->63193 63173 5b5409 63200 5ba8bd 36 API calls 63173->63200 63175 5b541a 63177 5bb31a 63176->63177 63178 5bb2e4 63176->63178 63177->63146 63201 5bb17c 57 API calls 63178->63201 63180 5bb2e9 63181 5bb2f3 63180->63181 63182 5bb300 63180->63182 63202 5beb55 HeapAlloc 63181->63202 63184 5bb31d 63182->63184 63203 5bf69c HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 63182->63203 63184->63146 63185 5bb2fd 63185->63184 63187 5bb30e HeapDestroy 63185->63187 63187->63177 63188->63152 63189->63158 63190->63160 63191->63164 63192->63167 63204 5d9774 63193->63204 63198->63162 63199 5b8970 32 API calls 63199->63173 63200->63175 63201->63180 63202->63185 63203->63185 63215 5d84d5 63204->63215 63212 5b5400 63212->63199 63213 5d97bb 63243 5de892 68 API calls 63213->63243 63244 5dd176 63215->63244 63218 5dd150 65 API calls 63219 5d84e6 63218->63219 63220 5dd150 63219->63220 63221 5dd6d8 65 API calls 63220->63221 63223 5dd15f 63221->63223 63222 5d9786 63225 5ddfd3 SetErrorMode SetErrorMode 63222->63225 63223->63222 63273 5dd76d 63223->63273 63226 5dd150 65 API calls 63225->63226 63227 5ddfea 63226->63227 63228 5dd150 65 API calls 63227->63228 63229 5ddff9 63228->63229 63230 5de01f 63229->63230 63281 5de036 63229->63281 63232 5dd150 65 API calls 63230->63232 63233 5de024 63232->63233 63234 5d979e 63233->63234 63300 5d84ea 63233->63300 63234->63213 63236 5d35d7 63234->63236 63237 5d35e3 63236->63237 63239 5d35ec 63236->63239 63237->63213 63238 5d35f4 63324 5b5208 63238->63324 63239->63238 63241 5d3633 63239->63241 63331 5d34ab 29 API calls 63241->63331 63243->63212 63245 5dd150 65 API calls 63244->63245 63246 5dd17b 63245->63246 63249 5dd6d8 63246->63249 63250 5dd70e TlsGetValue 63249->63250 63251 5dd6e1 63249->63251 63253 5dd721 63250->63253 63257 5dd6fb 63251->63257 63270 5dd2d8 65 API calls 63251->63270 63254 5d84da 63253->63254 63255 5dd734 63253->63255 63254->63218 63254->63219 63271 5dd4e0 65 API calls 63255->63271 63260 5dd371 EnterCriticalSection 63257->63260 63258 5dd70c 63258->63250 63261 5dd390 63260->63261 63262 5dd44c 63261->63262 63264 5dd3dd GlobalHandle GlobalUnlock GlobalReAlloc 63261->63264 63265 5dd3ca GlobalAlloc 63261->63265 63263 5dd461 LeaveCriticalSection 63262->63263 63263->63258 63266 5dd3ff 63264->63266 63265->63266 63267 5dd40d GlobalHandle GlobalLock LeaveCriticalSection 63266->63267 63268 5dd428 GlobalLock 63266->63268 63272 5d0faa 65 API calls __EH_prolog 63267->63272 63268->63262 63270->63257 63271->63254 63272->63268 63274 5dd777 __EH_prolog 63273->63274 63275 5dd7a5 63274->63275 63279 5de44f 6 API calls 63274->63279 63275->63222 63277 5dd78e 63280 5de4bf LeaveCriticalSection 63277->63280 63279->63277 63280->63275 63282 5dd150 65 API calls 63281->63282 63283 5de049 GetModuleFileNameA 63282->63283 63311 5b7317 29 API calls 63283->63311 63285 5de07b 63312 5de153 lstrlenA lstrcpynA 63285->63312 63287 5de097 63291 5de0ad 63287->63291 63317 5b9b5d 29 API calls 63287->63317 63289 5de0ff lstrcpyA 63319 5b9b5d 29 API calls 63289->63319 63290 5de11a 63294 5de147 63290->63294 63295 5de129 lstrcatA 63290->63295 63299 5de0e7 63291->63299 63313 5d92e6 63291->63313 63294->63230 63320 5b9b5d 29 API calls 63295->63320 63299->63289 63299->63290 63301 5dd150 65 API calls 63300->63301 63302 5d84ef 63301->63302 63303 5d8547 63302->63303 63321 5dcf1e 63302->63321 63303->63234 63306 5dd76d 7 API calls 63307 5d8525 63306->63307 63308 5d8532 63307->63308 63309 5dd150 65 API calls 63307->63309 63310 5dd6d8 65 API calls 63308->63310 63309->63308 63310->63303 63311->63285 63312->63287 63314 5dd150 65 API calls 63313->63314 63315 5d92ec LoadStringA 63314->63315 63316 5d9307 63315->63316 63318 5b9b5d 29 API calls 63316->63318 63317->63291 63318->63299 63319->63290 63320->63294 63322 5dd6d8 65 API calls 63321->63322 63323 5d84fb GetCurrentThreadId SetWindowsHookExA 63322->63323 63323->63306 63332 5b8e18 63324->63332 63326 5b5212 EnterCriticalSection 63327 5b5261 LeaveCriticalSection 63326->63327 63328 5b5230 63326->63328 63327->63237 63333 5d2f94 29 API calls 63328->63333 63330 5b5242 63330->63327 63331->63237 63332->63326 63333->63330 63334 5b6c27 63337 5b6c39 63334->63337 63338 5b6c36 63337->63338 63340 5b6c40 63337->63340 63340->63338 63341 5b6c65 63340->63341 63342 5b6c92 63341->63342 63344 5b6cd5 63341->63344 63350 5b6cc0 63342->63350 63359 5bd984 29 API calls 63342->63359 63349 5b6cf7 63344->63349 63344->63350 63345 5b6ca8 63360 5beef1 HeapReAlloc HeapAlloc VirtualAlloc HeapFree VirtualAlloc 63345->63360 63346 5b6d44 RtlAllocateHeap 63348 5b6cc7 63346->63348 63348->63340 63362 5bd984 29 API calls 63349->63362 63350->63346 63350->63348 63351 5b6cb3 63361 5b6ccc LeaveCriticalSection 63351->63361 63354 5b6cfe 63363 5bf994 6 API calls 63354->63363 63356 5b6d11 63364 5b6d2b LeaveCriticalSection 63356->63364 63358 5b6d1e 63358->63348 63358->63350 63359->63345 63360->63351 63361->63350 63362->63354 63363->63356 63364->63358 63365 5b7ae6 63375 5b7b1b 63365->63375 63366 5b7c01 63368 5b7bd3 RtlAllocateHeap 63368->63375 63374 5b7b95 63374->63368 63374->63375 63379 5bd984 29 API calls 63374->63379 63380 5bf994 6 API calls 63374->63380 63381 5b7c08 LeaveCriticalSection 63374->63381 63375->63366 63375->63368 63375->63374 63376 5bd984 29 API calls 63375->63376 63377 5beef1 HeapReAlloc HeapAlloc VirtualAlloc HeapFree VirtualAlloc 63375->63377 63378 5b7b7f LeaveCriticalSection 63375->63378 63376->63375 63377->63375 63378->63375 63379->63374 63380->63374 63381->63374
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: a09cfac538bf957463d812a45abac09a9f2656fd1b27599a3ba0622ce3e18579
                                                              • Instruction ID: c2de46c2e110e03bb3836efe9bf1d6d2d9826bb302206d3e888e94ac73e06a5a
                                                              • Opcode Fuzzy Hash: a09cfac538bf957463d812a45abac09a9f2656fd1b27599a3ba0622ce3e18579
                                                              • Instruction Fuzzy Hash: 1F0270B1E402569BFB00CF98DCC579EB7B1FF58324F180035E90AAB381D279A951CB22
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3e865087d264eed9a8594edd006f706368dc5d3afd3d14627e4f84ae6c79cb85
                                                              • Instruction ID: 2c122db4a046ccd08a9902a496f4fab6ed0343760d19c02a345c546a72c11e94
                                                              • Opcode Fuzzy Hash: 3e865087d264eed9a8594edd006f706368dc5d3afd3d14627e4f84ae6c79cb85
                                                              • Instruction Fuzzy Hash: 4071F5B1E40309ABEF10DFD4DD46BDF7BB4AB18710F140065FA08BA2C1E6B65A548B66

                                                              Control-flow Graph

                                                              APIs
                                                              • EnterCriticalSection.KERNEL32(0099ADA0,0099AD74,00000000,?,0099AD84,0099AD84,005DD70C,?,00000000,005DD15F,005DCA59,005DD17B,005D84DA,005D977F,?,00000000), ref: 005DD380
                                                              • GlobalAlloc.KERNEL32(00002002,00000000,?,?,0099AD84,0099AD84,005DD70C,?,00000000,005DD15F,005DCA59,005DD17B,005D84DA,005D977F,?,00000000), ref: 005DD3D5
                                                              • GlobalHandle.KERNEL32(00C00920), ref: 005DD3DE
                                                              • GlobalUnlock.KERNEL32(00000000), ref: 005DD3E7
                                                              • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 005DD3F9
                                                              • GlobalHandle.KERNEL32(00C00920), ref: 005DD410
                                                              • GlobalLock.KERNEL32(00000000), ref: 005DD417
                                                              • LeaveCriticalSection.KERNEL32(005B5400,?,?,0099AD84,0099AD84,005DD70C,?,00000000,005DD15F,005DCA59,005DD17B,005D84DA,005D977F,?,00000000), ref: 005DD41D
                                                              • GlobalLock.KERNEL32(00000000), ref: 005DD42C
                                                              • LeaveCriticalSection.KERNEL32(?), ref: 005DD475
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                                              • String ID:
                                                              • API String ID: 2667261700-0
                                                              • Opcode ID: 5ab22189311a2ebad29122c10dfcaf68b24ef659480a37e1aa2c4b6f0dffb315
                                                              • Instruction ID: 7da33687dd2fc7b43df2b405b6fde943d063634548bb340dfe96d7c00ca1a114
                                                              • Opcode Fuzzy Hash: 5ab22189311a2ebad29122c10dfcaf68b24ef659480a37e1aa2c4b6f0dffb315
                                                              • Instruction Fuzzy Hash: 30315E752007069FDB349F28DC89A2ABBF9FB44345B004D2EF592C7761E7B1E8088B20

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 787 5ddfd3-5ddffe SetErrorMode * 2 call 5dd150 * 2 792 5de01f-5de029 call 5dd150 787->792 793 5de000-5de01a call 5de036 787->793 797 5de02b call 5d84ea 792->797 798 5de030-5de033 792->798 793->792 797->798
                                                              APIs
                                                              • SetErrorMode.KERNEL32(00000000,00000000,005D979E,00000000,00000000,00000000,00000000,?,00000000,?,005D06D2,00000000,00000000,00000000,00000000,005B5400), ref: 005DDFDC
                                                              • SetErrorMode.KERNEL32(00000000,?,00000000,?,005D06D2,00000000,00000000,00000000,00000000,005B5400,00000000), ref: 005DDFE3
                                                                • Part of subcall function 005DE036: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 005DE067
                                                                • Part of subcall function 005DE036: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 005DE108
                                                                • Part of subcall function 005DE036: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 005DE135
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
                                                              • String ID:
                                                              • API String ID: 3389432936-0
                                                              • Opcode ID: 74979fa4a6354bda06d3e34d0de8cea16f9267f6b2a1f550bd31d889caff8fa5
                                                              • Instruction ID: f648720d37e68f1e03ebf893b4601359daccb5772ceb2309d34479fd004753d0
                                                              • Opcode Fuzzy Hash: 74979fa4a6354bda06d3e34d0de8cea16f9267f6b2a1f550bd31d889caff8fa5
                                                              • Instruction Fuzzy Hash: 79F03C749142128FD724FFA8D449B1A7FA4BF84750F05844BF4888F362CB74D840CBA2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 800 5bb2c4-5bb2e2 HeapCreate 801 5bb31a-5bb31c 800->801 802 5bb2e4-5bb2f1 call 5bb17c 800->802 805 5bb2f3-5bb2fe call 5beb55 802->805 806 5bb300-5bb303 802->806 812 5bb30a-5bb30c 805->812 808 5bb31d-5bb320 806->808 809 5bb305 call 5bf69c 806->809 809->812 812->808 813 5bb30e-5bb314 HeapDestroy 812->813 813->801
                                                              APIs
                                                              • HeapCreate.KERNEL32(00000000,00001000,00000000,005B537E,00000001), ref: 005BB2D5
                                                                • Part of subcall function 005BB17C: GetVersionExA.KERNEL32 ref: 005BB19B
                                                              • HeapDestroy.KERNEL32 ref: 005BB314
                                                                • Part of subcall function 005BEB55: HeapAlloc.KERNEL32(00000000,00000140,005BB2FD,000003F8), ref: 005BEB62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$AllocCreateDestroyVersion
                                                              • String ID:
                                                              • API String ID: 2507506473-0
                                                              • Opcode ID: e382e7c3f428cd7d34fb75f93cedb8d05016d1001c53b2ca164e24fb5cfed674
                                                              • Instruction ID: 29df3f369555872aa1071a143968944b911a3c305fd8de90a5eb22261fb7b6c9
                                                              • Opcode Fuzzy Hash: e382e7c3f428cd7d34fb75f93cedb8d05016d1001c53b2ca164e24fb5cfed674
                                                              • Instruction Fuzzy Hash: CFF06574914302DAFF101B345D56BA93EDCBB94742F300837F501CD0A2EBE0A480AA11

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 814 5d84ea-5d84f3 call 5dd150 817 5d8548 814->817 818 5d84f5-5d8520 call 5dcf1e GetCurrentThreadId SetWindowsHookExA call 5dd76d 814->818 822 5d8525-5d852b 818->822 823 5d852d-5d8532 call 5dd150 822->823 824 5d8538-5d8547 call 5dd6d8 822->824 823->824 824->817
                                                              APIs
                                                              • GetCurrentThreadId.KERNEL32 ref: 005D84FD
                                                              • SetWindowsHookExA.USER32(000000FF,005D8842,00000000,00000000), ref: 005D850D
                                                                • Part of subcall function 005DD76D: __EH_prolog.LIBCMT ref: 005DD772
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CurrentH_prologHookThreadWindows
                                                              • String ID:
                                                              • API String ID: 2183259885-0
                                                              • Opcode ID: 3d1efe0212738801cf29c23b8482a59eed54d785b68280a1e35d6b12a49e8380
                                                              • Instruction ID: fd2ee590a910e95e936ca9d381a1cf88ff5bfd10e2ef3153c0d8fcf29b4bf27f
                                                              • Opcode Fuzzy Hash: 3d1efe0212738801cf29c23b8482a59eed54d785b68280a1e35d6b12a49e8380
                                                              • Instruction Fuzzy Hash: 5EF0A0314403526BDB343BFCB80DB282EB1FB80760F480657F1515A3D2CB648C84C7A2

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1487 5b7ae6-5b7b19 1488 5b7b1b-5b7b1f 1487->1488 1489 5b7b2f 1487->1489 1490 5b7b21-5b7b23 1488->1490 1491 5b7b24-5b7b2d 1488->1491 1492 5b7b31-5b7b37 1489->1492 1490->1491 1491->1492 1493 5b7b3d-5b7b45 1492->1493 1494 5b7be5-5b7be8 1492->1494 1495 5b7b88-5b7b8b 1493->1495 1496 5b7b47-5b7b50 1493->1496 1497 5b7bea-5b7bf0 1494->1497 1498 5b7c11 1494->1498 1500 5b7bce-5b7bd1 1495->1500 1502 5b7b8d-5b7b93 1495->1502 1496->1500 1501 5b7b52-5b7b73 call 5bd984 call 5beef1 call 5b7b7f 1496->1501 1497->1498 1503 5b7bf2-5b7bfb call 5bfd69 1497->1503 1499 5b7c14-5b7c22 1498->1499 1500->1498 1505 5b7bd3-5b7be2 RtlAllocateHeap 1500->1505 1501->1505 1521 5b7b75-5b7b78 1501->1521 1502->1500 1506 5b7b95-5b7bbf call 5bd984 call 5bf994 call 5b7c08 1502->1506 1503->1492 1513 5b7c01 1503->1513 1505->1494 1506->1505 1522 5b7bc1 1506->1522 1513->1499 1523 5b7bc2-5b7bcb call 5b8ed0 1521->1523 1522->1523 1523->1500
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000008,?,00000000,00000000,00000001,005BB10D,00000001,00000074,?,?,00000000,00000001), ref: 005B7BDC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocateHeap
                                                              • String ID:
                                                              • API String ID: 1279760036-0
                                                              • Opcode ID: 9fb456ad3c79d50fc741dbb5c3bcd7aac967e3bc3df556e0a144d19c14283bad
                                                              • Instruction ID: a9bc743ccea399bc8b2816315feb11e12bed9fa9b3161697d07447f568360f55
                                                              • Opcode Fuzzy Hash: 9fb456ad3c79d50fc741dbb5c3bcd7aac967e3bc3df556e0a144d19c14283bad
                                                              • Instruction Fuzzy Hash: 64319032D0862DAFCF10AFA89C81ADDBF74FB88724F14422AE411B71D1D7346940DEA4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1526 5b6c65-5b6c90 1527 5b6c92-5b6c9b 1526->1527 1528 5b6cd5-5b6cd8 1526->1528 1529 5b6ca1-5b6cc5 call 5bd984 call 5beef1 call 5b6ccc 1527->1529 1530 5b6d34-5b6d39 1527->1530 1528->1530 1531 5b6cda-5b6cdf 1528->1531 1529->1530 1551 5b6cc7 1529->1551 1533 5b6d3b-5b6d3d 1530->1533 1534 5b6d3e-5b6d43 1530->1534 1535 5b6ce9-5b6ceb 1531->1535 1536 5b6ce1-5b6ce7 1531->1536 1533->1534 1538 5b6d44-5b6d4c RtlAllocateHeap 1534->1538 1539 5b6cec-5b6cf5 1535->1539 1536->1539 1541 5b6d52-5b6d60 1538->1541 1542 5b6cf7-5b6d23 call 5bd984 call 5bf994 call 5b6d2b 1539->1542 1543 5b6d25-5b6d26 1539->1543 1542->1541 1542->1543 1543->1538 1551->1541
                                                              APIs
                                                              • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 005B6D4C
                                                                • Part of subcall function 005BD984: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,005B7B9C,00000009,00000000,00000000,00000001,005BB10D,00000001,00000074,?,?,00000000,00000001), ref: 005BD9C1
                                                                • Part of subcall function 005BD984: EnterCriticalSection.KERNEL32(?,?,?,005B7B9C,00000009,00000000,00000000,00000001,005BB10D,00000001,00000074,?,?,00000000,00000001), ref: 005BD9DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$AllocateEnterHeapInitialize
                                                              • String ID:
                                                              • API String ID: 1616793339-0
                                                              • Opcode ID: 0830eec87d8e1843dbdd634952df152a0d7f83f24061c86e21bd218a78522b1e
                                                              • Instruction ID: 7c35abca433f347f415975f1667e6c39adc1f51d5c7dda94e9840f3f2a7ba247
                                                              • Opcode Fuzzy Hash: 0830eec87d8e1843dbdd634952df152a0d7f83f24061c86e21bd218a78522b1e
                                                              • Instruction Fuzzy Hash: 05219532A00205ABDB10AB68DC46BE9BFA8FB00764F144616F510EB1D1D778F9419A54

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1554 5b6b3e-5b6b66 1555 5b6c18-5b6c26 1554->1555 1556 5b6b6c-5b6b74 1554->1556 1557 5b6bb1-5b6bb4 1556->1557 1558 5b6b76-5b6b8e call 5bd984 call 5beb9d 1556->1558 1560 5b6c09 1557->1560 1561 5b6bb6-5b6bdb call 5bd984 call 5bf8f8 1557->1561 1570 5b6b99-5b6ba6 call 5b6ba8 1558->1570 1571 5b6b90-5b6b98 call 5bebc8 1558->1571 1564 5b6c0a-5b6c12 RtlFreeHeap 1560->1564 1572 5b6bdd-5b6be9 call 5bf94f 1561->1572 1573 5b6bec-5b6bf5 call 5b6c00 1561->1573 1564->1555 1582 5b6bf9 1570->1582 1571->1570 1572->1573 1573->1582 1582->1555 1583 5b6bfb-5b6bfe 1582->1583 1583->1564
                                                              APIs
                                                              • RtlFreeHeap.NTDLL(00000000,00000000,00000000,?,00000000,?,005B7B9C,00000009,00000000,00000000,00000001,005BB10D,00000001,00000074), ref: 005B6C12
                                                                • Part of subcall function 005BD984: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,005B7B9C,00000009,00000000,00000000,00000001,005BB10D,00000001,00000074,?,?,00000000,00000001), ref: 005BD9C1
                                                                • Part of subcall function 005BD984: EnterCriticalSection.KERNEL32(?,?,?,005B7B9C,00000009,00000000,00000000,00000001,005BB10D,00000001,00000074,?,?,00000000,00000001), ref: 005BD9DC
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$EnterFreeHeapInitialize
                                                              • String ID:
                                                              • API String ID: 641406236-0
                                                              • Opcode ID: f226b0d27769e0a77bebc0943ad755bc43ff9b9d074d98147188cc5668143e13
                                                              • Instruction ID: 76c608aae71e8122beb7091c95e157632b6d1f51f4b4b03fd7352ba148979382
                                                              • Opcode Fuzzy Hash: f226b0d27769e0a77bebc0943ad755bc43ff9b9d074d98147188cc5668143e13
                                                              • Instruction Fuzzy Hash: AC21D47280560AABDF10AB94DC06FEEBF78FF04720F240129F410F61D1DB79A940CAA4

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1584 5d92e6-5d9305 call 5dd150 LoadStringA 1587 5d9309-5d930a 1584->1587 1588 5d9307 1584->1588 1588->1587
                                                              APIs
                                                              • LoadStringA.USER32(?,?,?,?), ref: 005D92FD
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: LoadString
                                                              • String ID:
                                                              • API String ID: 2948472770-0
                                                              • Opcode ID: 7be3a6b6d769e87af5a2c25bce31723fcbb54a12d67e459c3bf1a37547124475
                                                              • Instruction ID: 61130d7e66df4924a0710c23cfa5c522ce7a210218a7e727c13ee19e4d404c0d
                                                              • Opcode Fuzzy Hash: 7be3a6b6d769e87af5a2c25bce31723fcbb54a12d67e459c3bf1a37547124475
                                                              • Instruction Fuzzy Hash: 27D05E724083A29B8A119FA48808D4FBFA8BF54350B054C0AF58092211D3249444C661
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: /main/data/Bot/$0jn$\main$\main\corn$\main\corn\libeay32.dll$\main\corn\sqlite3.dll$\main\corn\zlib.dll$\main\data$\main\data\app$\main\data\dll$\main\data\plugin$\main\plugin
                                                              • API String ID: 0-965314504
                                                              • Opcode ID: c1c03016180e478c0ac920598340215be8034d766009a3c2441bbc7167f8ddc1
                                                              • Instruction ID: 8d3680c0ec9d37c0f81c03ae8177cf5f6e3824b40b2e65d75c0d96bb8569ec76
                                                              • Opcode Fuzzy Hash: c1c03016180e478c0ac920598340215be8034d766009a3c2441bbc7167f8ddc1
                                                              • Instruction Fuzzy Hash: 163270B1F04345BBFB109ED59C86FAF7AB4EB10704F040079FE04B6382E6769A949B65
                                                              APIs
                                                              • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,005BB47E,?,Microsoft Visual C++ Runtime Library,00012010,?,008402CC,?,0084031C,?,?,?,Runtime Error!Program: ), ref: 005C2902
                                                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 005C291A
                                                              • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 005C292B
                                                              • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 005C2938
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AddressProc$LibraryLoad
                                                              • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                                              • API String ID: 2238633743-4044615076
                                                              • Opcode ID: 02597825a0ebac1ead56c12fa8be39a8735673cb763d1b0fc01b5f28d7ea5d45
                                                              • Instruction ID: a5b160564d5e18a237ea3a7c54e87890ca981b852e425047a487d6b8b3e4de26
                                                              • Opcode Fuzzy Hash: 02597825a0ebac1ead56c12fa8be39a8735673cb763d1b0fc01b5f28d7ea5d45
                                                              • Instruction Fuzzy Hash: 1E015271718306AF97109FF96C80E177FE8B758B91B00042EA648D3222D7798845BB61
                                                              APIs
                                                              • GetVersionExA.KERNEL32 ref: 005BB19B
                                                              • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 005BB1D0
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 005BB230
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: EnvironmentFileModuleNameVariableVersion
                                                              • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                                                              • API String ID: 1385375860-4131005785
                                                              • Opcode ID: aed3d3d59d55922db745ff103ecf3cad385a747ff14cc90285c697b987acddcc
                                                              • Instruction ID: 89e40dc706d7996b255e60140a5dd3bf82a6b5ab8cf42a1b26132a563593d28d
                                                              • Opcode Fuzzy Hash: aed3d3d59d55922db745ff103ecf3cad385a747ff14cc90285c697b987acddcc
                                                              • Instruction Fuzzy Hash: 203137759412886DFB359A745C5ABEDBF68FF42304F2404E9E185DA042E7F0BE89CB11
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID: !
                                                              • API String ID: 0-2657877971
                                                              • Opcode ID: cb256e704a3ef711179e2cfd2e64b52d5ac3dfd5f8a2d77874b17285884bff1c
                                                              • Instruction ID: 9e9b27764547914050b9cd5da6cbbb4a06d8c60d89eb7104d4e52fbfda42928b
                                                              • Opcode Fuzzy Hash: cb256e704a3ef711179e2cfd2e64b52d5ac3dfd5f8a2d77874b17285884bff1c
                                                              • Instruction Fuzzy Hash: 30131270D00619EBEF10AFD1ED8AADDBF71FF48310F10816AF9587A295DB724A608B51
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                              • Instruction ID: 91d1f13879fe2af70fcff5c79436c4eed6fbb77cb5d0dae820a0aaef01d5960c
                                                              • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                              • Instruction Fuzzy Hash: 5F111964A14208C7EB00DFA4D580BAFB376FF2C700F105169D908EB395E67A9F10C7AA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                              • Instruction ID: d3e49c5d33dce1431e6fd8aa759a7a76e5b6ef6f4c7b2453ebd6144ec9781717
                                                              • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                              • Instruction Fuzzy Hash: 64111964A10608C7EB00CFA4D580BAFB375FF5C700F105069D508EB395E77A9E11CBAA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                              • Instruction ID: 01f099d18c6b415d3832f90d77feb675fcd7c53e74234c8559e8395d3005ed85
                                                              • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                              • Instruction Fuzzy Hash: E6112B64A10208D7EB00CFA4D580BAFB375FF2C700F105069D908EB395E77A9E50C7AA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                              • Instruction ID: 7766a2280c4e9b36cfed8236e1ba4d3201192a5faea65bddfee612504bb00803
                                                              • Opcode Fuzzy Hash: df243571f50a38fa1868784450a17c7f6b8ff57fb907259a4febf094eb20b85c
                                                              • Instruction Fuzzy Hash: 12112B64A14208C7EB00DFA4D480BAFB375FF6C700F105069D909EB395E77A9E11C7AA
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 40d7bfbdab18aea4cdce0da10df7c32ef1de199f2718a6935834140590d0a55c
                                                              • Instruction ID: 2b9f377f2a5fed8a827970c6b3dbf1163f3a7f57913ce452a8326b52c108c3b8
                                                              • Opcode Fuzzy Hash: 40d7bfbdab18aea4cdce0da10df7c32ef1de199f2718a6935834140590d0a55c
                                                              • Instruction Fuzzy Hash: 2611FC78A55318EFCB11CF99E9C0A88BBF0BF1D314B5054A5DA489B306D2306E50EF62
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 387a41c2cda38a352361a5503079e532562a1bb8d84b34a3624ffd7b7a34b8c3
                                                              • Instruction ID: 87e5827b5320926c841f058aaa09686196a737325b56300e34f91b30ed841264
                                                              • Opcode Fuzzy Hash: 387a41c2cda38a352361a5503079e532562a1bb8d84b34a3624ffd7b7a34b8c3
                                                              • Instruction Fuzzy Hash: D10112B1D00209ABEF10DFD59D867EEBA74FF14300F1040A9EA1837392E6775A548BA2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4166609f46e1e3870822f18e47ad906b85be3cb121b05c48cc550c3ccd7ee5f7
                                                              • Instruction ID: 2dcd1bd821cbc9a0c9a99013c0af897fff7243ac31b2f2e11f57f49e9af32425
                                                              • Opcode Fuzzy Hash: 4166609f46e1e3870822f18e47ad906b85be3cb121b05c48cc550c3ccd7ee5f7
                                                              • Instruction Fuzzy Hash: 1DD0C934250789CFDB01CF54C0D1B41B3A8EB89748F108071DD419B385D2B8F945CAA1
                                                              APIs
                                                              • LCMapStringW.KERNEL32(00000000,00000100,0084054C,00000001,00000000,00000000,7591E860,0099F0A4,?,?,?,005B70FD,?,?,?,00000000), ref: 005BE8C6
                                                              • LCMapStringA.KERNEL32(00000000,00000100,00840548,00000001,00000000,00000000,?,?,005B70FD,?,?,?,00000000,00000001), ref: 005BE8E2
                                                              • LCMapStringA.KERNEL32(?,?,?,005B70FD,?,?,7591E860,0099F0A4,?,?,?,005B70FD,?,?,?,00000000), ref: 005BE92B
                                                              • MultiByteToWideChar.KERNEL32(?,0099F0A5,?,005B70FD,00000000,00000000,7591E860,0099F0A4,?,?,?,005B70FD,?,?,?,00000000), ref: 005BE963
                                                              • MultiByteToWideChar.KERNEL32(00000000,00000001,?,005B70FD,?,00000000,?,?,005B70FD,?), ref: 005BE9BB
                                                              • LCMapStringW.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,005B70FD,?), ref: 005BE9D1
                                                              • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,?,005B70FD,?), ref: 005BEA04
                                                              • LCMapStringW.KERNEL32(?,?,?,?,?,00000000,?,?,005B70FD,?), ref: 005BEA6C
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: String$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 352835431-0
                                                              • Opcode ID: dc9e2076fc9567b3085baf16fee96769e4732fac43a86113aefe322a5478d841
                                                              • Instruction ID: 810c3fb4cb9b44b9c5649ec3fac4571a87eedda2ccbbbb21422f3a76c37527da
                                                              • Opcode Fuzzy Hash: dc9e2076fc9567b3085baf16fee96769e4732fac43a86113aefe322a5478d841
                                                              • Instruction Fuzzy Hash: 15519D32900649EFCF228F54DC8AAEE7FB9FF49754F284119F910A5160E335AD50EB61
                                                              APIs
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 005BB3C7
                                                              • GetStdHandle.KERNEL32(000000F4,008402CC,00000000,00000000,00000000,?), ref: 005BB49D
                                                              • WriteFile.KERNEL32(00000000), ref: 005BB4A4
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: File$HandleModuleNameWrite
                                                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                              • API String ID: 3784150691-4022980321
                                                              • Opcode ID: 1db03452a98882469f3c5fb7b41adee18e0672fc6ea0d4f60989cbd50e111002
                                                              • Instruction ID: 43871472c394f0d5185cbb7cd2b9c935937fae12e35983d2de8643c6c74e9674
                                                              • Opcode Fuzzy Hash: 1db03452a98882469f3c5fb7b41adee18e0672fc6ea0d4f60989cbd50e111002
                                                              • Instruction Fuzzy Hash: 7031B472A00208AFEF20AB64CD4AFEE7BADFB85700F500466F644E6142E7F4B944CE51
                                                              APIs
                                                              • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,005B53B6), ref: 005BADAE
                                                              • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,005B53B6), ref: 005BADC2
                                                              • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,005B53B6), ref: 005BADEE
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,005B53B6), ref: 005BAE26
                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,005B53B6), ref: 005BAE48
                                                              • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,005B53B6), ref: 005BAE61
                                                              • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,005B53B6), ref: 005BAE74
                                                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 005BAEB2
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                                              • String ID:
                                                              • API String ID: 1823725401-0
                                                              • Opcode ID: bc6142ba86739c60ccae65c9280fb67a61a93eeb0c6f26a4fc17b237fe758cdb
                                                              • Instruction ID: 8d54d50d2b1630a7565e5bbda38088bc073f8276d94ce1cba3625223b7e4c0b4
                                                              • Opcode Fuzzy Hash: bc6142ba86739c60ccae65c9280fb67a61a93eeb0c6f26a4fc17b237fe758cdb
                                                              • Instruction Fuzzy Hash: F331C6B25082656FDB207FB89CC88BB7F9CF699758755092AF592C3100E771FC4492A3
                                                              APIs
                                                              • GetStringTypeW.KERNEL32(00000001,0084054C,00000001,?,7591E860,0099F0A4,?,?,005B70FD,?,?,?,00000000,00000001), ref: 005C2059
                                                              • GetStringTypeA.KERNEL32(00000000,00000001,00840548,00000001,?,?,005B70FD,?,?,?,00000000,00000001), ref: 005C2073
                                                              • GetStringTypeA.KERNEL32(?,?,?,?,005B70FD,7591E860,0099F0A4,?,?,005B70FD,?,?,?,00000000,00000001), ref: 005C20A7
                                                              • MultiByteToWideChar.KERNEL32(?,0099F0A5,?,?,00000000,00000000,7591E860,0099F0A4,?,?,005B70FD,?,?,?,00000000,00000001), ref: 005C20DF
                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?,?,?,?,?,005B70FD,?), ref: 005C2135
                                                              • GetStringTypeW.KERNEL32(?,?,00000000,005B70FD,?,?,?,?,?,?,005B70FD,?), ref: 005C2147
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: StringType$ByteCharMultiWide
                                                              • String ID:
                                                              • API String ID: 3852931651-0
                                                              • Opcode ID: d88ebaae84529ebfe950663121b81a67342de8d899e5da1459765a3df676aca0
                                                              • Instruction ID: a8bb65e482d21593df186225b6b358f48abf6f6f34b4bae0a7a37c473b16bb57
                                                              • Opcode Fuzzy Hash: d88ebaae84529ebfe950663121b81a67342de8d899e5da1459765a3df676aca0
                                                              • Instruction Fuzzy Hash: BA41AF72A00209AFCF219F94DC86EEF7F79FB08750F14042AFA15E6260D3359914DB90
                                                              APIs
                                                              • TlsGetValue.KERNEL32(0099AD84,0099AD74,00000000,?,0099AD84,?,005DD748,0099AD74,00000000,?,00000000,005DD15F,005DCA59,005DD17B,005D84DA,005D977F), ref: 005DD4EB
                                                              • EnterCriticalSection.KERNEL32(0099ADA0,00000010,?,0099AD84,?,005DD748,0099AD74,00000000,?,00000000,005DD15F,005DCA59,005DD17B,005D84DA,005D977F), ref: 005DD53A
                                                              • LeaveCriticalSection.KERNEL32(0099ADA0,00000000,?,0099AD84,?,005DD748,0099AD74,00000000,?,00000000,005DD15F,005DCA59,005DD17B,005D84DA,005D977F), ref: 005DD54D
                                                              • LocalAlloc.KERNEL32(00000000,00000005,?,0099AD84,?,005DD748,0099AD74,00000000,?,00000000,005DD15F,005DCA59,005DD17B,005D84DA,005D977F), ref: 005DD563
                                                              • LocalReAlloc.KERNEL32(?,00000005,00000002,?,0099AD84,?,005DD748,0099AD74,00000000,?,00000000,005DD15F,005DCA59,005DD17B,005D84DA,005D977F), ref: 005DD575
                                                              • TlsSetValue.KERNEL32(0099AD84,00000000), ref: 005DD5B1
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocCriticalLocalSectionValue$EnterLeave
                                                              • String ID:
                                                              • API String ID: 4117633390-0
                                                              • Opcode ID: 2ca6b3cba18ca24217bf527ddf05e036b185bbeaa95a8183f16844c96af8c3c6
                                                              • Instruction ID: d0ecf769678f7da3e30af50ed204bdbb94464ffe6a52f21c22c4a3f8c6bfefa7
                                                              • Opcode Fuzzy Hash: 2ca6b3cba18ca24217bf527ddf05e036b185bbeaa95a8183f16844c96af8c3c6
                                                              • Instruction Fuzzy Hash: 5F318E75100A06AFD724DF58D889F6ABBF8FF85358F00891AE556CB750E770E909CB60
                                                              APIs
                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 005DE067
                                                                • Part of subcall function 005DE153: lstrlenA.KERNEL32(00000104,00000000,?,005DE097), ref: 005DE18A
                                                              • lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 005DE108
                                                              • lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 005DE135
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileModuleNamelstrcatlstrcpylstrlen
                                                              • String ID: .HLP$.INI
                                                              • API String ID: 2421895198-3011182340
                                                              • Opcode ID: 8ea3bc26a90596c83f1408a2a2dee1272323a6e9adc27387cba94f0f4d0067ae
                                                              • Instruction ID: 0626d0527fa51c390e52313910c4e4c2833dc321f80fe017117b5fc04a58c01c
                                                              • Opcode Fuzzy Hash: 8ea3bc26a90596c83f1408a2a2dee1272323a6e9adc27387cba94f0f4d0067ae
                                                              • Instruction Fuzzy Hash: 413163759047199FDB21EBB4D889BC6BBF8BB44300F10496BE299D7241DB74A984CF60
                                                              APIs
                                                              • GetStartupInfoA.KERNEL32(?), ref: 005BAF23
                                                              • GetFileType.KERNEL32(?,?,00000000), ref: 005BAFCE
                                                              • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 005BB031
                                                              • GetFileType.KERNEL32(00000000,?,00000000), ref: 005BB03F
                                                              • SetHandleCount.KERNEL32 ref: 005BB076
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: FileHandleType$CountInfoStartup
                                                              • String ID:
                                                              • API String ID: 1710529072-0
                                                              • Opcode ID: 509cde762f58b435e4039584e76e329be269318e836ff09a5820fff0d10f802a
                                                              • Instruction ID: 32c139b9ecff22ca85c098a144ec5a20ae7d61922c0fe9c2877e19f152e4d438
                                                              • Opcode Fuzzy Hash: 509cde762f58b435e4039584e76e329be269318e836ff09a5820fff0d10f802a
                                                              • Instruction Fuzzy Hash: 695146755086468FD720DF28C8887FA7FE0FB21368F244669D5A2CB2E1D7B0E905D751
                                                              APIs
                                                              • GetLastError.KERNEL32(00000103,7FFFFFFF,005B76F2,005B9FA8,00000000,?,?,00000000,00000001), ref: 005BB0EA
                                                              • TlsGetValue.KERNEL32(?,?,00000000,00000001), ref: 005BB0F8
                                                              • SetLastError.KERNEL32(00000000,?,?,00000000,00000001), ref: 005BB144
                                                                • Part of subcall function 005B7AE6: RtlAllocateHeap.NTDLL(00000008,?,00000000,00000000,00000001,005BB10D,00000001,00000074,?,?,00000000,00000001), ref: 005B7BDC
                                                              • TlsSetValue.KERNEL32(00000000,?,?,00000000,00000001), ref: 005BB11C
                                                              • GetCurrentThreadId.KERNEL32 ref: 005BB12D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: ErrorLastValue$AllocateCurrentHeapThread
                                                              • String ID:
                                                              • API String ID: 2047054392-0
                                                              • Opcode ID: 413326f26ddf3ed0e8644b47c25416e80d8ea17eff9dc983b0dd4535cddb9d34
                                                              • Instruction ID: 6b3bce78a42b613e1e129ba3c8751f93eed0a01a09c3d3403e94571bb10324cf
                                                              • Opcode Fuzzy Hash: 413326f26ddf3ed0e8644b47c25416e80d8ea17eff9dc983b0dd4535cddb9d34
                                                              • Instruction Fuzzy Hash: 07F0F636501A129BD7253B34BC0D69E3F10FB547B1F100A24FA91991A0FBE09840AA50
                                                              APIs
                                                              • HeapAlloc.KERNEL32(00000000,00002020,0093C630,0093C630,?,?,005BFB68,00000000,00000010,00000000,00000009,00000009,?,005B6D11,00000010,00000000), ref: 005BF6BD
                                                              • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,005BFB68,00000000,00000010,00000000,00000009,00000009,?,005B6D11,00000010,00000000), ref: 005BF6E1
                                                              • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,005BFB68,00000000,00000010,00000000,00000009,00000009,?,005B6D11,00000010,00000000), ref: 005BF6FB
                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,005BFB68,00000000,00000010,00000000,00000009,00000009,?,005B6D11,00000010,00000000,?), ref: 005BF7BC
                                                              • HeapFree.KERNEL32(00000000,00000000,?,?,005BFB68,00000000,00000010,00000000,00000009,00000009,?,005B6D11,00000010,00000000,?,00000000), ref: 005BF7D3
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocVirtual$FreeHeap
                                                              • String ID:
                                                              • API String ID: 714016831-0
                                                              • Opcode ID: 68813af4335caf302f85bfe5e603fb0cfdabf0c465b60a2f9ce2f6055567f21e
                                                              • Instruction ID: 90316d71a968b235e8b8b2236aa74a8787435009eaa7cedc7ab2e851a1bd640e
                                                              • Opcode Fuzzy Hash: 68813af4335caf302f85bfe5e603fb0cfdabf0c465b60a2f9ce2f6055567f21e
                                                              • Instruction Fuzzy Hash: 2031F4B5600B069BD3308F28DC86BA1BFE4FB54758F20453AE595AB6A0EB70B804DB44
                                                              APIs
                                                              • GetVersion.KERNEL32 ref: 005B5346
                                                                • Part of subcall function 005BB2C4: HeapCreate.KERNEL32(00000000,00001000,00000000,005B537E,00000001), ref: 005BB2D5
                                                                • Part of subcall function 005BB2C4: HeapDestroy.KERNEL32 ref: 005BB314
                                                              • GetCommandLineA.KERNEL32 ref: 005B53A6
                                                              • GetStartupInfoA.KERNEL32(?), ref: 005B53D1
                                                              • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 005B53F4
                                                                • Part of subcall function 005B544D: ExitProcess.KERNEL32 ref: 005B546A
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                              • String ID:
                                                              • API String ID: 2057626494-0
                                                              • Opcode ID: c305aaafea5752434a90eb38f41c8c429d33974189e7010a9360edcc92d66ed2
                                                              • Instruction ID: 61e9e0f06172acf076dce06e158b9555e0fe1b97b30278eb918b7c56d0b7af9e
                                                              • Opcode Fuzzy Hash: c305aaafea5752434a90eb38f41c8c429d33974189e7010a9360edcc92d66ed2
                                                              • Instruction Fuzzy Hash: FC21B4B1944B46AFEB1CAFA4DD59BBD7FA8FF84700F00042AF5019A291EB745440DBA1
                                                              APIs
                                                              • GetCPInfo.KERNEL32(?,00000000), ref: 005BA25D
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: Info
                                                              • String ID: $
                                                              • API String ID: 1807457897-3032137957
                                                              • Opcode ID: acced1e81391b46b2d9a800b8bf8524fc81180c7b45ce8134d7cd5f628e48ef7
                                                              • Instruction ID: 8feac04754ae3e1a7d638928782ea5889c3a8ea21c2f59bed21cfd3a2377282a
                                                              • Opcode Fuzzy Hash: acced1e81391b46b2d9a800b8bf8524fc81180c7b45ce8134d7cd5f628e48ef7
                                                              • Instruction Fuzzy Hash: 47413B320082585EEB129718DC6ABFABFD9BB01704F2808F6D589C7053D2765A48D7A3
                                                              APIs
                                                              • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,005BEFC2,00000000,00000000,00000000,005B6CB3,00000000,00000000,?,00000000,00000000,00000000), ref: 005BF222
                                                              • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,005BEFC2,00000000,00000000,00000000,005B6CB3,00000000,00000000,?,00000000,00000000,00000000), ref: 005BF256
                                                              • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 005BF270
                                                              • HeapFree.KERNEL32(00000000,?), ref: 005BF287
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: AllocHeap$FreeVirtual
                                                              • String ID:
                                                              • API String ID: 3499195154-0
                                                              • Opcode ID: a2158c197440031b1b98bb2af31e4dc83cc8a837d34fbe207f6c6824d8c6ad6e
                                                              • Instruction ID: 2f5d71fe6a833a117b1b2554116f1abbde6f24c08b0746fb021d9c98c0b8d672
                                                              • Opcode Fuzzy Hash: a2158c197440031b1b98bb2af31e4dc83cc8a837d34fbe207f6c6824d8c6ad6e
                                                              • Instruction Fuzzy Hash: CF116D75204600AFCB208F1DEC95962FBFAFB447257644A3EE195C71B1D371A85AEF10
                                                              APIs
                                                              • EnterCriticalSection.KERNEL32(0099AF48,?,00000000,?,?,005DD78E,00000010,?,00000000,?,?,?,005DD175,005DD1D8,005DCA59,005DD17B), ref: 005DE48A
                                                              • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,005DD78E,00000010,?,00000000,?,?,?,005DD175,005DD1D8,005DCA59,005DD17B), ref: 005DE49C
                                                              • LeaveCriticalSection.KERNEL32(0099AF48,?,00000000,?,?,005DD78E,00000010,?,00000000,?,?,?,005DD175,005DD1D8,005DCA59,005DD17B), ref: 005DE4A5
                                                              • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,005DD78E,00000010,?,00000000,?,?,?,005DD175,005DD1D8,005DCA59,005DD17B,005D84DA), ref: 005DE4B7
                                                                • Part of subcall function 005DE3BC: GetVersion.KERNEL32(?,005DE45F,?,005DD78E,00000010,?,00000000,?,?,?,005DD175,005DD1D8,005DCA59,005DD17B,005D84DA,005D977F), ref: 005DE3CF
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalSection$Enter$InitializeLeaveVersion
                                                              • String ID:
                                                              • API String ID: 1193629340-0
                                                              • Opcode ID: 9d86293134f0c893355f2f7a2124a4962e6ded661ceabc3aeccb3ad86bf37d4b
                                                              • Instruction ID: 819726f5c05c638beb68bdea9d4ec91a3e256d42cfd4c6136f62bb50296504e6
                                                              • Opcode Fuzzy Hash: 9d86293134f0c893355f2f7a2124a4962e6ded661ceabc3aeccb3ad86bf37d4b
                                                              • Instruction Fuzzy Hash: 0DF0AF7200421EDFCF20EF5DECC5856B7ACFB2431AB00482BE65587026E734A409EAA1
                                                              APIs
                                                              • InitializeCriticalSection.KERNEL32(?,005BB087,?,005B5390), ref: 005BD968
                                                              • InitializeCriticalSection.KERNEL32(?,005BB087,?,005B5390), ref: 005BD970
                                                              • InitializeCriticalSection.KERNEL32(?,005BB087,?,005B5390), ref: 005BD978
                                                              • InitializeCriticalSection.KERNEL32(?,005BB087,?,005B5390), ref: 005BD980
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2115954936.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                              • Associated: 00000000.00000002.2115934061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000005E5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116115854.00000000006CD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116407572.0000000000915000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116431648.0000000000917000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116453806.0000000000919000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116470820.0000000000923000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116489093.0000000000924000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116513053.000000000092A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116531446.000000000092B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116562819.000000000093A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116583185.000000000093E000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000093F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000094B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000988000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.0000000000999000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116604791.000000000099F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                              • Associated: 00000000.00000002.2116713997.00000000009A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_400000_MQNT.jbxd
                                                              Yara matches
                                                              Similarity
                                                              • API ID: CriticalInitializeSection
                                                              • String ID:
                                                              • API String ID: 32694325-0
                                                              • Opcode ID: 5305b68c16c88aaa0b1bf9994405d9a83480e21acf49109446e433e50e6f3bdd
                                                              • Instruction ID: 9d93f04f6e04f713068ef9f3c719804f2383eb45da4ce9559e058ecdaa81e7ec
                                                              • Opcode Fuzzy Hash: 5305b68c16c88aaa0b1bf9994405d9a83480e21acf49109446e433e50e6f3bdd
                                                              • Instruction Fuzzy Hash: B5C002B1828938ABCE166B65FE4684E3F66EB052A0301806BE144720309A621C24FFC0