Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1467035
MD5:06e9439beabd1813ff13295adbba48ff
SHA1:f70c1c806fcb2fbbd97d4c9ecf7c473b3dc957da
SHA256:47eb2e1f94933fc6da9cf436804c0a303c539de3ce93c7dfaa6b427625447a22
Tags:exe
Infos:

Detection

Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Yara detected Powershell download and execute
Yara detected Vidar stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Sample uses string decryption to hide its real strings
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries information about the installed CPU (vendor, model number etc)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 5316 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 06E9439BEABD1813FF13295ADBBA48FF)
    • WerFault.exe (PID: 2032 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 2068 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": ["https://steamcommunity.com/profiles/76561199730044335", "https://t.me/bu77un"], "Botnet": "d2e09041336e6342825973ff413879b9"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2334234419.0000000000976000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x527:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
      00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        Process Memory Space: file.exe PID: 5316JoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
          Click to see the 2 entries
          SourceRuleDescriptionAuthorStrings
          0.2.file.exe.9423fa.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            0.2.file.exe.9423fa.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://steamcommunity.com/profiles/76561199730044335Avira URL Cloud: Label: malware
              Source: https://t.me/bu77unAvira URL Cloud: Label: malware
              Source: 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": ["https://steamcommunity.com/profiles/76561199730044335", "https://t.me/bu77un"], "Botnet": "d2e09041336e6342825973ff413879b9"}
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: INSERT_KEY_HERE
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetProcAddress
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: LoadLibraryA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: lstrcatA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: OpenEventA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CreateEventA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CloseHandle
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Sleep
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetUserDefaultLangID
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: VirtualAllocExNuma
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: VirtualFree
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetSystemInfo
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: VirtualAlloc
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: HeapAlloc
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetComputerNameA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: lstrcpyA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetProcessHeap
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetCurrentProcess
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: lstrlenA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ExitProcess
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GlobalMemoryStatusEx
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetSystemTime
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SystemTimeToFileTime
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: advapi32.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: gdi32.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: user32.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: crypt32.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ntdll.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetUserNameA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CreateDCA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetDeviceCaps
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ReleaseDC
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CryptStringToBinaryA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sscanf
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: NtQueryInformationProcess
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: VMwareVMware
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: HAL9TH
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: JohnDoe
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: DISPLAY
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %hu/%hu/%hu
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetEnvironmentVariableA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetFileAttributesA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GlobalLock
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: HeapFree
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetFileSize
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GlobalSize
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CreateToolhelp32Snapshot
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: IsWow64Process
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Process32Next
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetLocalTime
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: FreeLibrary
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetTimeZoneInformation
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetSystemPowerStatus
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetVolumeInformationA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetWindowsDirectoryA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Process32First
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetLocaleInfoA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetUserDefaultLocaleName
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetModuleFileNameA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: DeleteFileA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: FindNextFileA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: LocalFree
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: FindClose
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SetEnvironmentVariableA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: LocalAlloc
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetFileSizeEx
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ReadFile
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SetFilePointer
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: WriteFile
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CreateFileA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: FindFirstFileA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CopyFileA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: VirtualProtect
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetLogicalProcessorInformationEx
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetLastError
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: lstrcpynA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: MultiByteToWideChar
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GlobalFree
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: WideCharToMultiByte
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GlobalAlloc
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: OpenProcess
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: TerminateProcess
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetCurrentProcessId
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: gdiplus.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ole32.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: bcrypt.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: wininet.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: shlwapi.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: shell32.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: psapi.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: rstrtmgr.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CreateCompatibleBitmap
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SelectObject
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: BitBlt
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: DeleteObject
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CreateCompatibleDC
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GdipGetImageEncodersSize
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GdipGetImageEncoders
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GdipCreateBitmapFromHBITMAP
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GdiplusStartup
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GdiplusShutdown
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GdipSaveImageToStream
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GdipDisposeImage
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GdipFree
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetHGlobalFromStream
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CreateStreamOnHGlobal
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CoUninitialize
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CoInitialize
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CoCreateInstance
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: BCryptGenerateSymmetricKey
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: BCryptCloseAlgorithmProvider
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: BCryptDecrypt
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: BCryptSetProperty
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: BCryptDestroyKey
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: BCryptOpenAlgorithmProvider
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetWindowRect
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetDesktopWindow
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetDC
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CloseWindow
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: wsprintfA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: EnumDisplayDevicesA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetKeyboardLayoutList
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CharToOemW
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: wsprintfW
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RegQueryValueExA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RegEnumKeyExA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RegOpenKeyExA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RegCloseKey
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RegEnumValueA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CryptBinaryToStringA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CryptUnprotectData
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SHGetFolderPathA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ShellExecuteExA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: InternetOpenUrlA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: InternetConnectA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: InternetCloseHandle
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: InternetOpenA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: HttpSendRequestA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: HttpOpenRequestA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: InternetReadFile
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: InternetCrackUrlA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: StrCmpCA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: StrStrA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: StrCmpCW
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: PathMatchSpecA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: GetModuleFileNameExA
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RmStartSession
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RmRegisterResources
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RmGetList
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: RmEndSession
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3_open
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3_prepare_v2
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3_step
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3_column_text
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3_finalize
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3_close
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3_column_bytes
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3_column_blob
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: encrypted_key
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: PATH
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: C:\ProgramData\nss3.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: NSS_Init
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: NSS_Shutdown
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: PK11_GetInternalKeySlot
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: PK11_FreeSlot
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: PK11_Authenticate
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: PK11SDR_Decrypt
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: C:\ProgramData\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Soft:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: profile:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Host:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Login:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Password:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Opera
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: OperaGX
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Network
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Cookies
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: .txt
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: TRUE
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: FALSE
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Autofill
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SELECT name, value FROM autofill
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: History
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SELECT url FROM urls LIMIT 1000
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Name:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Month:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Year:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Card:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Cookies
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Login Data
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Web Data
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: History
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: logins.json
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: formSubmitURL
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: usernameField
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: encryptedUsername
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: encryptedPassword
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: guid
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: cookies.sqlite
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: formhistory.sqlite
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: places.sqlite
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Plugins
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Local Extension Settings
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Sync Extension Settings
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: IndexedDB
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Opera Stable
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Opera GX Stable
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: CURRENT
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: chrome-extension_
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: _0.indexeddb.leveldb
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Local State
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: profiles.ini
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: chrome
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: opera
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: firefox
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Wallets
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %08lX%04lX%lu
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ProductName
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %d/%d/%d %d:%d:%d
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ProcessorNameString
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: DisplayName
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: DisplayVersion
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: freebl3.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: mozglue.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: msvcp140.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: nss3.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: softokn3.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: vcruntime140.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \Temp\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: .exe
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: runas
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: open
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: /c start
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %DESKTOP%
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %APPDATA%
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %LOCALAPPDATA%
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %USERPROFILE%
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %DOCUMENTS%
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %PROGRAMFILES%
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %PROGRAMFILES_86%
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: %RECENT%
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: *.lnk
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Files
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \discord\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \Local Storage\leveldb\CURRENT
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \Local Storage\leveldb
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \Telegram Desktop\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: key_datas
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: D877F783D5D3EF8C*
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: map*
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: A7FDF864FBC10B77*
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: A92DAA6EA6F891F2*
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: F8806DD0C461824F*
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Telegram
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: *.tox
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: *.ini
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Password
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: 00000001
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: 00000002
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: 00000003
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: 00000004
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \Outlook\accounts.txt
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Pidgin
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \.purple\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: accounts.xml
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: dQw4w9WgXcQ
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: token:
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Software\Valve\Steam
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: SteamPath
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \config\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ssfn*
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: config.vdf
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: DialogConfig.vdf
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: DialogConfigOverlay*.vdf
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: libraryfolders.vdf
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: loginusers.vdf
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \Steam\
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: sqlite3.dll
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: browsers
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: done
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Soft
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: \Discord\tokens.txt
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: /c timeout /t 5 & del /f /q "
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: C:\Windows\system32\cmd.exe
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: https
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: POST
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: HTTP/1.1
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: Content-Disposition: form-data; name="
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: hwid
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: build
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: token
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: file_name
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: file
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: message
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
              Source: 0.2.file.exe.9423fa.0.raw.unpackString decryptor: screenshot.jpg
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F87E41 CryptUnprotectData,LocalAlloc,LocalFree,0_2_02F87E41
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8AB80 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_02F8AB80
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9302D CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_02F9302D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F87DC2 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_02F87DC2
              Source: file.exe, 00000000.00000000.2099747111.00000000010CD000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_64b4a83a-d
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49707 version: TLS 1.2
              Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: D:\BuildServer\bna-2\work-git\bootstrapper-repository\src\Release\Bootstrapper.pdbs source: file.exe
              Source: Binary string: D:\BuildServer\bna-2\work-git\bootstrapper-repository\src\Release\Bootstrapper.pdb source: file.exe
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8C6B5 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_02F8C6B5
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8D690 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_02F8D690
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F977D3 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F977D3
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F89FC0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F89FC0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9738D GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_02F9738D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F964C7 wsprintfA,FindFirstFileA,memset,memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcat,strtok_s,strtok_s,memset,lstrcat,strtok_s,PathMatchSpecA,DeleteFileA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,strtok_s,FindNextFileA,FindClose,0_2_02F964C7
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8BC98 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_02F8BC98
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F81443 FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F81443
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8C039 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F8C039
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8E016 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F8E016
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F96D7D wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_02F96D7D

              Networking

              barindex
              Source: Malware configuration extractorURLs: https://steamcommunity.com/profiles/76561199730044335
              Source: Malware configuration extractorURLs: https://t.me/bu77un
              Source: global trafficTCP traffic: 192.168.2.6:49708 -> 116.202.180.70:5432
              Source: global trafficHTTP traffic detected: GET /bu77un HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
              Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
              Source: Joe Sandbox ViewIP Address: 149.154.167.99 149.154.167.99
              Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownTCP traffic detected without corresponding DNS query: 116.202.180.70
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F84AD5 GetProcessHeap,RtlAllocateHeap,InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,InternetSetOptionA,HttpSendRequestA,HttpQueryInfoA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_02F84AD5
              Source: global trafficHTTP traffic detected: GET /bu77un HTTP/1.1Host: t.meConnection: Keep-AliveCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: t.me
              Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
              Source: file.exeString found in binary or memory: http:///1.18.10.3141/Apps/Battle.net.agent.db
              Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
              Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: file.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
              Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: file.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: file.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
              Source: file.exe, 00000000.00000002.2334293329.00000000009F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
              Source: file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: file.exe, 00000000.00000003.2227716018.000000000A074000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2227655043.000000000A06D000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.2227758478.000000000A07D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?c5c6e24cd307b
              Source: file.exeString found in binary or memory: http://iir.blizzard.com:3724/submit/BNET_APP
              Source: file.exeString found in binary or memory: http://iir.blizzard.com:3724/submit/BNET_APPUnknown
              Source: file.exeString found in binary or memory: http://nydus.battle.net/App/%s/setup/error/%s
              Source: file.exeString found in binary or memory: http://nydus.battle.net/geoip
              Source: file.exeString found in binary or memory: http://nydus.battle.net/geoipX-Geoip-RegionX-Geoip-CountryUSCNSEASGGETd:
              Source: file.exeString found in binary or memory: http://ocsp.digicert.com0
              Source: file.exeString found in binary or memory: http://ocsp.digicert.com0A
              Source: file.exeString found in binary or memory: http://ocsp.digicert.com0C
              Source: file.exeString found in binary or memory: http://ocsp.digicert.com0X
              Source: file.exeString found in binary or memory: http://scripts.sil.org/OFL
              Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
              Source: file.exeString found in binary or memory: http://www.digicert.com/CPS0
              Source: file.exeString found in binary or memory: http://www.google.com/get/noto/
              Source: file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70/
              Source: file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432
              Source: file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/
              Source: file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/1
              Source: file.exe, 00000000.00000002.2339985934.000000000A06D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/2
              Source: file.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/T
              Source: file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/Y/h
              Source: file.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/dows
              Source: file.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/ps;PATHEXT=.CO
              Source: file.exe, 00000000.00000002.2336090672.00000000030B9000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/sqlt.dll
              Source: file.exe, 00000000.00000002.2336090672.00000000030B9000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/sqlt.dll4
              Source: file.exe, 00000000.00000002.2336090672.00000000030B9000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/sqlt.dllnamK.exe
              Source: file.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432/talV
              Source: file.exe, 00000000.00000002.2336090672.0000000003148000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432Content-Disposition:
              Source: file.exe, 00000000.00000002.2336090672.0000000003148000.00000004.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2336090672.0000000002FB0000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://116.202.180.70:5432rss.exe
              Source: file.exeString found in binary or memory: https://bitwarden.com
              Source: file.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
              Source: file.exeString found in binary or memory: https://nydus.battle.net/App/%s/setup/app
              Source: file.exeString found in binary or memory: https://nydus.battle.net/App/%s/setup/appSelected
              Source: file.exe, file.exe, 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199730044335
              Source: file.exe, 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://steamcommunity.com/profiles/76561199730044335hellosqlt.dllsqlite3.dll
              Source: file.exe, 00000000.00000002.2334293329.00000000009A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/
              Source: file.exe, 00000000.00000002.2336090672.0000000002FC5000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://t.me/bu77un
              Source: file.exe, 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmpString found in binary or memory: https://t.me/bu77unguf_hMozilla/5.0
              Source: file.exeString found in binary or memory: https://telemetry-in.battle.net/data
              Source: file.exeString found in binary or memory: https://telemetry-in.battlenet.com.cn/data
              Source: file.exeString found in binary or memory: https://telemetry-in.battlenet.com.cn/datahttps://telemetry-in.battle.net/data
              Source: file.exe, 00000000.00000003.2210215100.0000000000A27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://web.telegram.org
              Source: file.exeString found in binary or memory: https://www.openssl.org/docs/faq.html
              Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
              Source: unknownHTTPS traffic detected: 149.154.167.99:443 -> 192.168.2.6:49707 version: TLS 1.2
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F93160 memset,GetDesktopWindow,GetWindowRect,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,GlobalFix,GlobalSize,SelectObject,DeleteObject,DeleteObject,ReleaseDC,CloseWindow,0_2_02F93160

              System Summary

              barindex
              Source: 00000000.00000002.2334234419.0000000000976000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00977D3D NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00977D3D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00977D3D0_2_00977D3D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0094037D0_2_0094037D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009604E60_2_009604E6
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009400000_2_00940000
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009601130_2_00960113
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009606BB0_2_009606BB
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00960EC90_2_00960EC9
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9F6CF0_2_02F9F6CF
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9EEC10_2_02F9EEC1
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9ECEC0_2_02F9ECEC
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9E9190_2_02F9E919
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 2068
              Source: file.exeStatic PE information: invalid certificate
              Source: file.exe, 00000000.00000000.2099940661.0000000001263000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBattle.net-Setup.exeD vs file.exe
              Source: file.exeBinary or memory string: OriginalFilenameBattle.net-Setup.exeD vs file.exe
              Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 00000000.00000002.2334234419.0000000000976000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
              Source: classification engineClassification label: mal100.troj.evad.winEXE@2/7@2/2
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00940A8D CreateToolhelp32Snapshot,Thread32First,Wow64SuspendThread,FindCloseChangeNotification,0_2_00940A8D
              Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\BNR8DUDO.htmJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5316
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\e44e4a1c-0572-4549-9da6-a8b01284fa9aJump to behavior
              Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: file.exeString found in binary or memory: %lxLoadLibraryExA\/AddDllDirectoryserver response timeoutselect/poll errorcached response data too big to handleresponse reading failedExcessive server response line length received, %zd bytes. Stripping
              Source: file.exeString found in binary or memory: id-cmc-addExtensions
              Source: file.exeString found in binary or memory: set-addPolicy
              Source: file.exeString found in binary or memory: en Sie alle Battle.net-Installationsprogramme, warten Sie 30 Sekunden und versuchen Sie es erneut.
              Source: file.exeString found in binary or memory: en Sie alle Battle.net-Installationsprogramme, warten Sie 30 Sekunden und versuchen Sie es erneut.Ups! Sieht so aus, als ob etwas nicht mehr korrekt funktioniert. Fehlercode: {error_code}Ups! Sieht so aus, als ob etwas nicht mehr korrekt funktioniert: {message}
              Source: file.exeString found in binary or memory: battle.net-launcher.log
              Source: file.exeString found in binary or memory: battle.net-launcher
              Source: file.exeString found in binary or memory: @{%s}enUSBytesKilobytesMegabytesGigabytesTerabytes%.2finvalid unordered_map<K, T> keyd:\buildserver\bna-2\work-git\bootstrapper-repository\contrib\contrib\cajun\json\reader.inlm_itCurrent != m_Tokens.end()nullUnexpected character in stream: Expected string: Unrecognized escape sequence found in string: \0123456789.eE-+Unexpected end of token streamUnexpected token: Duplicate object member token: Unexpected character in NUMBER token: Unexpected End of token streamObject member already exists: expires_atbtsagentusfiledirectorymessageplatformwinconfigtagsallupdate_methoddistproduct=btsproduct=AgentSTATE_INVALID_PROGRESS_STATESTATE_CHECK_ENVIRONMENTSTATE_UPDATE_BOOTSTRAPPERSTATE_EXTRACT_AGENTSTATE_START_AGENTSTATE_CHECK_AGENTSTATE_UPDATE_AGENTSTATE_CHECK_CLIENTSTATE_UPDATE_CLIENTSTATE_LAUNCH_CLIENTSTATE_CHECK_UNREGISTERED_CLIENTSTATE_INSTALL_CLIENTSTATE_SELECT_LANGUAGESTATE_TRIGGER_RESTARTSTATE_EXITINGRESTART_RUN_SETUPRESTART_RUN_ORIGINALRESTART_ELEVATEanalytic] - launchersetupWe were launched by cmdver= and we are cmdver=, allowing self-patching to occurBootstrapper work completed. Shutting down.LogsFailed to check if another instance of bootstrapper is running. Shutting down...Another instance of bootstrapper is running. Shutting down...Checking permissions on path: depth=Elevation is unnecessary. The current user is an administrator.Permissions problem detected for path and elevation is required. path=Failed to repair file/folder permissions: path=Session hash generated. hash=Session hash extracted from process. hash=Checking for bootstrapper updates.We need to patch but are running from the patching location. Continuing without patching.We are currently up to date.Agent is missing. Will download Agent.The installed agent is older than the one remotely available. Will download Agent.Agent is currently up to date.Elevation required: Restarting to fix Image File Execution options.Agent is running as another user. We can't safely perform work with agent. Shutting down...An update is in progress. Transitioning to update state to track the update.Beta branch detected on client, setting to retail branchAlready updated client. Skipping updateBattle.netpatchBootstrapper thread startedA crash delay ws set via command line argument.Battle.net Setup started. Running from: Configuration: locale= region= uid=Running as adminEmbedded data found on command line: Embedded data found in binary: Session hash found: client_idAn error code is set via command line argument. Raising that error nowAn agent error code is set via command line argument. Raising that error nowBootstrapper thread completedEntering main loop.Bootstrapper State: Invalid transition to state: Restart triggered with reason: Failed to update agent. Continuing on.filenameHandling exception in state Exceeded maximum exception countException converted to: Bootstrapperbattle.net-setup.logbattle.net-launcher.logbattle.net-setupbattle.net-launcherPosting exception to controller: Failed to create Batt
              Source: file.exeString found in binary or memory: DBG-ADDR<{:x}>("{}")
              Source: file.exeString found in binary or memory: DBG-ADDR<
              Source: file.exeString found in binary or memory: : error %u: (%u)%s %s.%s Log-auto-attachmentDBG-ADDR<{:x}>("{}")DBG-OPTIONS<FunctionsOnly>
              Source: file.exeString found in binary or memory: WowError.exeAssertion FailureWowErrord.exeUnknown ErrorFatal Exception<unknown>ERROR #%u (0x%08x) %s %s%08X %08X %04X:%08X %s<can't read from this address>%08X: Exe:%02X %02X %02X %02X Time:%-10s%sUser:%-10s%3s %2d, %4d %2d:%02d:%02d.%03d %cMMemory DumpComputer:Stack: %d bytes starting at (ESP = %08X)Code: %d bytes starting at (EIP = %08X)<unknown symbol><unknown module>**** SymGetLineFromAddr() failed, error: %d**** SymGetModuleInfo() failed, error: %d%08X %-12s %s+%d (0x%08X,0x%08X,0x%08X,0x%08X) (%s,%d)**** SymGetSymFromAddr() failed, error: %d%08X %-12s %s+%d (%s,%d)%08X %-12s %s+%d (0x%08X,0x%08X,0x%08X,0x%08X)**** StackWalk() returned FALSE, error: %d%08X %-12s %s+%dStack Trace (Using DBGHELP.DLL)**** StackWalk() returned zero address - skipping stack frameShowing %d/%d threads...**** Couldn't load DBGHELP.DLL, error: %d--- Thread ID: %d ------ Thread ID: %d [Current Thread] ---**** Unable to retrieve thread context, error: %d**** Unable to gain access to the thread, error: Address Frame Logical addr ModuleStack Trace (Manual)%4.4x%2.2x%16.16lx%8.8xx86 Registers = %04xLoaded Modules%02x%08x>("DBG-ADDR<+")DBG-MODULE<%8x" "%04d-%02d-%02d %02d.%02d.%02d>dbghelp.dllBlizzard::DebugSymFunctionTableAccess64StackWalk64SymGetModuleBase64SymGetLineFromAddr64SymGetOptionsSymGetModuleInfo64SymInitializeSymGetSymFromAddr64SymSetOptionsSymCleanupSymEnumerateSymbols64SymEnumerateModules64EAXMiniDumpWriteDumpECXEBXESIEDXEBPEDIEIPESPCSFLGESDSGSFSDR0SSDR2DR1DR6DR3psapi.dllDR7GetModuleInformationEnumProcessModules<Application>{}
              Source: file.exeString found in binary or memory: /install
              Source: file.exeString found in binary or memory: J|U-QtJ|4,QExecuteUpdateCreateShortcutUninstall/updateresult_uri{"uid":"%s"}/installresponse_urirun64bit/gamesessionuninstall_complete%s/%sinstructions_productinstructions_patch_urlforminstructions_dataset{"uid":"%s","background_download": %s}{"paused": false}{"uid" : "%s","title" : "%s"}/createshortcut/backfill/version(M|
              Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 2068
              Source: C:\Users\user\Desktop\file.exeSection loaded: uiautomationcore.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: cryptnet.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: cabinet.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
              Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: file.exeStatic file information: File size 5158776 > 1048576
              Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2cc000
              Source: file.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x11e400
              Source: file.exeStatic PE information: More than 200 imports for KERNEL32.dll
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: D:\BuildServer\bna-2\work-git\bootstrapper-repository\src\Release\Bootstrapper.pdbs source: file.exe
              Source: Binary string: D:\BuildServer\bna-2\work-git\bootstrapper-repository\src\Release\Bootstrapper.pdb source: file.exe
              Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9A76B lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,LoadLibraryA,GetProcAddress,GetProcAddress,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,OpenEventA,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,CreateEventA,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,CloseHandle,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,CloseHandle,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,ExitProcess,0_2_02F9A76B
              Source: file.exeStatic PE information: real checksum: 0xbe708 should be: 0x4f7dcb
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009636EF push ecx; ret 0_2_00963702
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FA1EF5 push ecx; ret 0_2_02FA1F08
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9B050 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_02F9B050
              Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
              Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8C6B5 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_02F8C6B5
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8D690 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_02F8D690
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F977D3 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F977D3
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F89FC0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F89FC0
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9738D GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_02F9738D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F964C7 wsprintfA,FindFirstFileA,memset,memset,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,memset,lstrcat,strtok_s,strtok_s,memset,lstrcat,strtok_s,PathMatchSpecA,DeleteFileA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,strtok_s,FindNextFileA,FindClose,0_2_02F964C7
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8BC98 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_02F8BC98
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F81443 FindFirstFileA,StrCmpCA,StrCmpCA,FindFirstFileA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F81443
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8C039 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F8C039
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F8E016 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_02F8E016
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F96D7D wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_02F96D7D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F91F21 GetSystemInfo,wsprintfA,0_2_02F91F21
              Source: Amcache.hve.6.drBinary or memory string: VMware
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
              Source: file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW$mK
              Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.6.drBinary or memory string: vmci.sys
              Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: file.exe, 00000000.00000002.2334293329.00000000009A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareY
              Source: Amcache.hve.6.drBinary or memory string: VMware20,1
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: file.exe, 00000000.00000002.2334293329.00000000009A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
              Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: file.exe, 00000000.00000002.2334293329.00000000009A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp{
              Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-34511
              Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FA224F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02FA224F
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9A76B lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,LoadLibraryA,GetProcAddress,GetProcAddress,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,lstrlenW,lstrlenW,lstrlenW,lstrlenW,lstrlenW,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,OpenEventA,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,CreateEventA,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,CloseHandle,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,CloseHandle,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,Sleep,ExitProcess,0_2_02F9A76B
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0094093D mov eax, dword ptr fs:[00000030h]0_2_0094093D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0094037D mov edx, dword ptr fs:[00000030h]0_2_0094037D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0095C4ED mov eax, dword ptr fs:[00000030h]0_2_0095C4ED
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00940CED mov eax, dword ptr fs:[00000030h]0_2_00940CED
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00940F8C mov eax, dword ptr fs:[00000030h]0_2_00940F8C
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00940F8D mov eax, dword ptr fs:[00000030h]0_2_00940F8D
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F9ACF3 mov eax, dword ptr fs:[00000030h]0_2_02F9ACF3
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F91ADD GetProcessHeap,RtlAllocateHeap,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,0_2_02F91ADD
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FA224F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_02FA224F
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FA1C0B memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_02FA1C0B
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02FA3DCD SetUnhandledExceptionFilter,0_2_02FA3DCD

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 5316, type: MEMORYSTR
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F90A14 memset,memset,CreateProcessA,VirtualAlloc,GetThreadContext,ReadProcessMemory,VirtualAllocEx,ResumeThread,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,0_2_02F90A14
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F938BA CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,FindCloseChangeNotification,0_2_02F938BA
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F937BD CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_02F937BD
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_009427FA cpuid 0_2_009427FA
              Source: C:\Users\user\Desktop\file.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_02F91D31
              Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
              Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3BFEC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F3BFEC
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F91BEC GetProcessHeap,RtlAllocateHeap,GetUserNameA,0_2_02F91BEC
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_02F91CBF GetProcessHeap,RtlAllocateHeap,GetTimeZoneInformation,wsprintfA,0_2_02F91CBF
              Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
              Source: file.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2334293329.00000000009A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe
              Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * From AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.file.exe.9423fa.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.file.exe.9423fa.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 5316, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 5316, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.file.exe.9423fa.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.file.exe.9423fa.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 5316, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              21
              Process Injection
              1
              Masquerading
              OS Credential Dumping2
              System Time Discovery
              Remote Services1
              Screen Capture
              21
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Virtualization/Sandbox Evasion
              LSASS Memory1
              Query Registry
              Remote Desktop Protocol11
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Native API
              Logon Script (Windows)Logon Script (Windows)21
              Process Injection
              Security Account Manager51
              Security Software Discovery
              SMB/Windows Admin SharesData from Network Shared Drive2
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS1
              Virtualization/Sandbox Evasion
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets12
              Process Discovery
              SSHKeylogging13
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
              Account Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              System Owner/User Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
              File and Directory Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow44
              System Information Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              file.exe0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://upx.sf.net0%URL Reputationsafe
              https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
              https://t.me/0%Avira URL Cloudsafe
              http://www.google.com/get/noto/0%Avira URL Cloudsafe
              https://telemetry-in.battlenet.com.cn/datahttps://telemetry-in.battle.net/data0%Avira URL Cloudsafe
              https://nydus.battle.net/App/%s/setup/app0%Avira URL Cloudsafe
              https://116.202.180.70:5432/0%Avira URL Cloudsafe
              https://www.openssl.org/docs/faq.html0%Avira URL Cloudsafe
              https://steamcommunity.com/profiles/76561199730044335100%Avira URL Cloudmalware
              https://116.202.180.70:5432/sqlt.dll40%Avira URL Cloudsafe
              http://nydus.battle.net/App/%s/setup/error/%s0%Avira URL Cloudsafe
              https://web.telegram.org0%Avira URL Cloudsafe
              http://nydus.battle.net/geoip0%Avira URL Cloudsafe
              https://116.202.180.70:5432/20%Avira URL Cloudsafe
              https://116.202.180.70:5432/10%Avira URL Cloudsafe
              https://t.me/bu77un100%Avira URL Cloudmalware
              https://116.202.180.70:5432/talV0%Avira URL Cloudsafe
              https://bitwarden.com0%Avira URL Cloudsafe
              https://116.202.180.70:5432/dows0%Avira URL Cloudsafe
              https://116.202.180.70:54320%Avira URL Cloudsafe
              https://116.202.180.70:5432/sqlt.dllnamK.exe0%Avira URL Cloudsafe
              https://116.202.180.70:5432rss.exe0%Avira URL Cloudsafe
              https://t.me/bu77unguf_hMozilla/5.00%Avira URL Cloudsafe
              https://telemetry-in.battlenet.com.cn/data0%Avira URL Cloudsafe
              http://iir.blizzard.com:3724/submit/BNET_APP0%Avira URL Cloudsafe
              https://steamcommunity.com/profiles/76561199730044335hellosqlt.dllsqlite3.dll0%Avira URL Cloudsafe
              https://telemetry-in.battle.net/data0%Avira URL Cloudsafe
              https://116.202.180.70:5432/T0%Avira URL Cloudsafe
              https://116.202.180.70:5432/ps;PATHEXT=.CO0%Avira URL Cloudsafe
              http:///1.18.10.3141/Apps/Battle.net.agent.db0%Avira URL Cloudsafe
              https://116.202.180.70:5432Content-Disposition:0%Avira URL Cloudsafe
              http://iir.blizzard.com:3724/submit/BNET_APPUnknown0%Avira URL Cloudsafe
              http://scripts.sil.org/OFL0%Avira URL Cloudsafe
              http://nydus.battle.net/geoipX-Geoip-RegionX-Geoip-CountryUSCNSEASGGETd:0%Avira URL Cloudsafe
              https://116.202.180.70:5432/sqlt.dll0%Avira URL Cloudsafe
              https://116.202.180.70/0%Avira URL Cloudsafe
              https://nydus.battle.net/App/%s/setup/appSelected0%Avira URL Cloudsafe
              https://116.202.180.70:5432/Y/h0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              t.me
              149.154.167.99
              truetrue
                unknown
                198.187.3.20.in-addr.arpa
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://steamcommunity.com/profiles/76561199730044335true
                  • Avira URL Cloud: malware
                  unknown
                  https://t.me/bu77untrue
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://116.202.180.70:5432/sqlt.dll4file.exe, 00000000.00000002.2336090672.00000000030B9000.00000004.10000000.00040000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://nydus.battle.net/App/%s/setup/appfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://t.me/file.exe, 00000000.00000002.2334293329.00000000009A8000.00000004.00000020.00020000.00000000.sdmptrue
                  • Avira URL Cloud: safe
                  unknown
                  https://telemetry-in.battlenet.com.cn/datahttps://telemetry-in.battle.net/datafile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nydus.battle.net/App/%s/setup/error/%sfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.openssl.org/docs/faq.htmlfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.google.com/get/noto/file.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://web.telegram.orgfile.exe, 00000000.00000003.2210215100.0000000000A27000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nydus.battle.net/geoipfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/2file.exe, 00000000.00000002.2339985934.000000000A06D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/dowsfile.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/1file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/talVfile.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://bitwarden.comfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://upx.sf.netAmcache.hve.6.drfalse
                  • URL Reputation: safe
                  unknown
                  https://116.202.180.70:5432file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432rss.exefile.exe, 00000000.00000002.2336090672.0000000003148000.00000004.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2336090672.0000000002FB0000.00000004.10000000.00040000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/sqlt.dllnamK.exefile.exe, 00000000.00000002.2336090672.00000000030B9000.00000004.10000000.00040000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://curl.haxx.se/docs/http-cookies.htmlfile.exefalse
                  • URL Reputation: safe
                  unknown
                  https://t.me/bu77unguf_hMozilla/5.0file.exe, 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://iir.blizzard.com:3724/submit/BNET_APPfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://telemetry-in.battlenet.com.cn/datafile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://telemetry-in.battle.net/datafile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/Tfile.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://steamcommunity.com/profiles/76561199730044335hellosqlt.dllsqlite3.dllfile.exe, 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmp, file.exe, 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http:///1.18.10.3141/Apps/Battle.net.agent.dbfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/ps;PATHEXT=.COfile.exe, 00000000.00000002.2340419499.000000000A43E000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://iir.blizzard.com:3724/submit/BNET_APPUnknownfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432Content-Disposition:file.exe, 00000000.00000002.2336090672.0000000003148000.00000004.10000000.00040000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://scripts.sil.org/OFLfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/sqlt.dllfile.exe, 00000000.00000002.2336090672.00000000030B9000.00000004.10000000.00040000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://nydus.battle.net/geoipX-Geoip-RegionX-Geoip-CountryUSCNSEASGGETd:file.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://nydus.battle.net/App/%s/setup/appSelectedfile.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70/file.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://116.202.180.70:5432/Y/hfile.exe, 00000000.00000002.2334293329.0000000000A0F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  116.202.180.70
                  unknownGermany
                  24940HETZNER-ASDEfalse
                  149.154.167.99
                  t.meUnited Kingdom
                  62041TELEGRAMRUtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1467035
                  Start date and time:2024-07-03 16:49:07 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 20s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:9
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:file.exe
                  Detection:MAL
                  Classification:mal100.troj.evad.winEXE@2/7@2/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 44
                  • Number of non-executed functions: 78
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                  • Excluded IPs from analysis (whitelisted): 93.184.221.240, 20.189.173.20
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, wu.ec.azureedge.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, login.live.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, blobcollector.events.data.trafficmanager.net, hlb.apr-52dd2-0.edgecastdns.net, umwatson.events.data.microsoft.com, wu-b-net.trafficmanager.net
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: file.exe
                  TimeTypeDescription
                  10:50:14API Interceptor1x Sleep call for process: file.exe modified
                  10:50:19API Interceptor1x Sleep call for process: WerFault.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  116.202.180.7082xul16VKj.exeGet hashmaliciousCryptOne, VidarBrowse
                    149.154.167.99http://telegramtw1.org/Get hashmaliciousUnknownBrowse
                    • telegram.org/?setln=pl
                    http://makkko.kz/Get hashmaliciousUnknownBrowse
                    • telegram.org/
                    http://telegram.dogGet hashmaliciousUnknownBrowse
                    • telegram.dog/
                    LnSNtO8JIa.exeGet hashmaliciousCinoshi StealerBrowse
                    • t.me/cinoshibot
                    jtfCFDmLdX.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                    • t.me/cinoshibot
                    vSlVoTPrmP.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                    • t.me/cinoshibot
                    RO67OsrIWi.exeGet hashmaliciousGurcu Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
                    • t.me/cinoshibot
                    KeyboardRGB.exeGet hashmaliciousUnknownBrowse
                    • t.me/cinoshibot
                    file.exeGet hashmaliciousCinoshi StealerBrowse
                    • t.me/cinoshibot
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    t.me1dntbjwU2s.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    XZ50BK5JPZ.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    82xul16VKj.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    file.exeGet hashmaliciousVidarBrowse
                    • 149.154.167.99
                    file.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                    • 149.154.167.99
                    pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                    • 149.154.167.99
                    https://clicktime.cloud.postoffice.net/clicktime.php?U=https%3A%2F%2Ftelegra.ph%2FDavis-Insurance-Agency-LLC-06-28&E=kgarber%40woodlandsbank.com&X=XID311CFbwQP1837Xd1&T=WDLP&HV=U,E,X,T&H=3a14786ee7a8dd2b0305ef5dd961d4108cbfaf34Get hashmaliciousUnknownBrowse
                    • 149.154.167.99
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    TELEGRAMRU1dntbjwU2s.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    XZ50BK5JPZ.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    19808bS58f.exeGet hashmaliciousAgentTeslaBrowse
                    • 149.154.167.220
                    0VcrCVxnMP.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 149.154.167.220
                    SecuriteInfo.com.Win64.PWSX-gen.4145.5357.exeGet hashmaliciousAgentTeslaBrowse
                    • 149.154.167.220
                    project plan.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 149.154.167.220
                    payment.exeGet hashmaliciousSnake KeyloggerBrowse
                    • 149.154.167.220
                    Safeguard and Grow Your Assets.htmlGet hashmaliciousUnknownBrowse
                    • 149.154.167.220
                    82xul16VKj.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    https://sula.starladeroff.com/Get hashmaliciousUnknownBrowse
                    • 149.154.167.99
                    HETZNER-ASDE82xul16VKj.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 116.202.180.70
                    https://gmoq4wwvl9phy.pages.dev/smart89/Get hashmaliciousUnknownBrowse
                    • 195.201.57.90
                    https://acmecomma.bitdocs.ai/share/d/cix0eL8Ef0J0SESMGet hashmaliciousUnknownBrowse
                    • 49.13.69.241
                    https://xxxjkam8s4e.z13.web.core.windows.net/?click_id=611h5aaw1cly4j0bmp&tid=701&subid=otka.com&ref=otka.com&883#Get hashmaliciousTechSupportScamBrowse
                    • 195.201.57.90
                    file.exeGet hashmaliciousVidarBrowse
                    • 49.13.159.121
                    hkLFB22XxS.exeGet hashmaliciousFormBookBrowse
                    • 135.181.212.206
                    file.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                    • 49.13.159.121
                    pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 49.13.159.121
                    https://he110ca11he1lpn0wwb112.pages.dev/Get hashmaliciousTechSupportScamBrowse
                    • 195.201.57.90
                    https://serviceca11he1pn0waa12.pages.dev/Get hashmaliciousTechSupportScamBrowse
                    • 195.201.57.90
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    37f463bf4616ecd445d4a1937da06e19d8gZVaN0ms.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Mars Stealer, RedLine, Stealc, VidarBrowse
                    • 149.154.167.99
                    1dntbjwU2s.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    XZ50BK5JPZ.exeGet hashmaliciousCryptOne, VidarBrowse
                    • 149.154.167.99
                    BomqT2a55e.exeGet hashmaliciousAgentTeslaBrowse
                    • 149.154.167.99
                    eXiJWkp8OE.exeGet hashmaliciousGuLoaderBrowse
                    • 149.154.167.99
                    MzjwuZnJF0.exeGet hashmaliciousGuLoaderBrowse
                    • 149.154.167.99
                    7Pqym5wyq5.exeGet hashmaliciousGuLoaderBrowse
                    • 149.154.167.99
                    fuqDLDLV7g.exeGet hashmaliciousUnknownBrowse
                    • 149.154.167.99
                    BPN__S-I03810366200624-820240628503036_202407010849535435_20240702135021#U00b7pdf.exeGet hashmaliciousGuLoader, LokibotBrowse
                    • 149.154.167.99
                    Inquiry Studbolt - 240703.vbeGet hashmaliciousGuLoaderBrowse
                    • 149.154.167.99
                    No context
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):1.1831758355341229
                    Encrypted:false
                    SSDEEP:192:Pp56fGxBvSQvIPpw0YvK6NC03jRdZrKFayIzuiF7Z24IO8nZBu:Us5IRLYvK6HjUjIzuiF7Y4IO8P
                    MD5:639229628C9F27DCAF7A22EA02848CAE
                    SHA1:C778755BB46072477A3EA256E06DA47F59C835FE
                    SHA-256:1ADD57D97A602986F58A86D29575E9BAABE90D896C8B629E8C28D50F2E4E80E3
                    SHA-512:9C46BA618112CAEA2C50FDA6B8C6D9AA76D4832071764256A3372C7F9DF7EEC6451EAB34B70C2F9B75C2989CA4BF23582E71D4FA713949E388482E77C260E8F3
                    Malicious:false
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.4.9.1.8.1.5.2.7.7.9.2.1.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.4.9.1.8.1.6.2.6.2.2.9.0.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.6.5.2.2.a.e.b.-.f.b.d.2.-.4.a.d.7.-.8.7.0.7.-.f.1.f.3.c.1.2.1.c.6.2.1.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.e.0.c.0.e.6.b.-.c.1.4.a.-.4.2.8.c.-.a.5.a.7.-.f.b.1.9.2.8.c.d.d.e.a.0.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.a.t.t.l.e...n.e.t.-.S.e.t.u.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.4.c.4.-.0.0.0.1.-.0.0.1.5.-.5.0.1.2.-.f.0.4.4.5.8.c.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.8.f.d.5.2.f.a.8.5.c.b.1.9.a.c.a.0.7.8.6.0.2.c.d.8.5.b.3.2.0.4.0.0.0.0.0.0.0.0.!.0.0.0.0.f.7.0.c.1.c.8.0.6.f.c.b.2.f.b.b.d.9.7.d.4.c.9.e.c.f.7.c.4.7.3.b.3.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 15 streams, Wed Jul 3 14:50:15 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):187574
                    Entropy (8bit):1.8277239220974038
                    Encrypted:false
                    SSDEEP:768:OHnikT6HSmIR7W5FRgwy/9RVDw+Tu9JkIv:SRO57gP1u9Jx
                    MD5:53409A5AC5D65329E0028E7DF080C131
                    SHA1:6809D86A0FBBDD4564AEAAF85A254AB30103D97E
                    SHA-256:94D1D0502A58993F32BC0FFA37A26D5F532DC60FBC17A717418721B782EA9090
                    SHA-512:254598C705C63D96DA29D9BD580E0176F68F41B377C93C1740FA42B315B6116B3FFEE61C594837FDBBFFA87B09294E7056FBEE5CF2B950E092FB8ECE6B0457A6
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... .......'e.f........................."..........$...T,..........fb..........`.......8...........T...........0X..............x,..........d...............................................................................eJ..............GenuineIntel............T............e.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8362
                    Entropy (8bit):3.6981652379830625
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJLCn6o6Y2DemSU9jgmfBfUJlscfupr189bVUsf+G7nm:R6lXJu6o6YiSU9jgmfpUJlsKZVHf+9
                    MD5:9DDF9BA4CE8F2A3F3631F27E92059441
                    SHA1:837BC2DEE830800A33D147F0DDB0C436667A3D34
                    SHA-256:19BE0F8BF89CDBD3D424970703BBDD8F8C4F3B0BB6D10CA88C7E448919194546
                    SHA-512:C4D328992B0B9A1FB97B32CD5E969ED4B9B2B0B36028318D7AB7736385262EEFA661221A4687DAE9F6248DA85DF36E3547485069580D2B85D2C41B9093A7EB28
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.3.1.6.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4690
                    Entropy (8bit):4.490284455717078
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zsCJg77aI94vrWpW8VYtYm8M4JIjzFnh+q8bqRFTcWvd:uIjfQI7KC7VJJGh1TcWvd
                    MD5:5826FE1E6871F5C532D1B2DCAE77EDEF
                    SHA1:9F54E23F0950D72591EEF014DE53A034160240BE
                    SHA-256:AA6B2903C0F8612AB333DC5DCCFA937AA9B22F2740778216CC1E47BF7AC69813
                    SHA-512:B46EBA7D59C1BC209EEA51F9858816AF98814FF44865130988E699BF02D5727A3812B4DA24456F126171E88C5C0CDD1A7725608D1695BA891E512D8BEA89CFF8
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="394912" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Users\user\Desktop\file.exe
                    File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                    Category:dropped
                    Size (bytes):71954
                    Entropy (8bit):7.996617769952133
                    Encrypted:true
                    SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                    MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                    SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                    SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                    SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                    Process:C:\Users\user\Desktop\file.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):328
                    Entropy (8bit):3.144086598890895
                    Encrypted:false
                    SSDEEP:6:kKrHa9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:DVDnLNkPlE99SNxAhUe/3
                    MD5:AAA449A9D4FD81D64402AAA465FCE03C
                    SHA1:DBA6B744C353C846F709A50833858C4CF522DEFF
                    SHA-256:86245B5BEBC4C4883EE2A94C9774453FDA2869A99146CFF4749BA4A6C5EC6925
                    SHA-512:6E26292B4B509515D230A1A95471219347A9392C6BB9CA31494BAB7673E99C5230F6F70A9FB3BD0BD74F73F4BAFB850EBAB165DCA8C92CD56A98671A511F0B78
                    Malicious:false
                    Reputation:low
                    Preview:p...... ........[..LX...(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.4689181212615265
                    Encrypted:false
                    SSDEEP:6144:7zZfpi6ceLPx9skLmb0fqZWSP3aJG8nAgeiJRMMhA2zX4WABluuNbjDH5S:3ZHtqZWOKnMM6bFp9j4
                    MD5:D832B3AA6F66FD3F48AB10827D5C2BEB
                    SHA1:7F8FC45A447153BA8635CF51B5ACD4E6AF69EF97
                    SHA-256:E79B4BDC59BFF9CC7362E7A796E0DCA24FE4FAAA11779ED1E08E4CA75C9BC1EA
                    SHA-512:2C22096077425005B865E32D567D9F36C913D1491285CEE76B71E871A52A4148A9FCF18EBB4A345497C405BD38352053EE46A4567338F759209786BBA3715434
                    Malicious:false
                    Reputation:low
                    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.xhPX..................................................................................................................................................................................................................................................................................................................................................d........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.905003406667077
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:5'158'776 bytes
                    MD5:06e9439beabd1813ff13295adbba48ff
                    SHA1:f70c1c806fcb2fbbd97d4c9ecf7c473b3dc957da
                    SHA256:47eb2e1f94933fc6da9cf436804c0a303c539de3ce93c7dfaa6b427625447a22
                    SHA512:3143051b25bce1e2a80dc11006398309d09308ae6542e0e20c1c3e95947ea798d176ea75c8a53265846a902b2d0f9e81dc315e1343ec7d5b7fd4e16d77d7d118
                    SSDEEP:98304:a84BwyMWieDN4+F/8njOyiiqTdAGlucxG3:aAEwnjOy5qzlucE3
                    TLSH:E436BF92BA40C075D14303706678BBBD46BEBEB02B21C5C36F94265DCDB35D2AA36397
                    File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$..........f...5...5...5...4...5...4...5...4...5Lc.5...5...4...5...4W..5...4...5...4...5...4...5...5...5...4...5...4...5...4T..5..05...
                    Icon Hash:071975cccc7d3907
                    Entrypoint:0x53b686
                    Entrypoint Section:.text
                    Digitally signed:true
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x64CC57ED [Fri Aug 4 01:44:13 2023 UTC]
                    TLS Callbacks:0x46ba43
                    CLR (.Net) Version:
                    OS Version Major:6
                    OS Version Minor:0
                    File Version Major:6
                    File Version Minor:0
                    Subsystem Version Major:6
                    Subsystem Version Minor:0
                    Import Hash:79dbe573912bfd2d08a3c01a29dfeaed
                    Signature Valid:false
                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                    Signature Validation Error:The digital signature of the object did not verify
                    Error Number:-2146869232
                    Not Before, Not After
                    • 02/02/2022 01:00:00 03/04/2025 01:59:59
                    Subject Chain
                    • CN=8bit Solutions LLC, O=8bit Solutions LLC, L=Jacksonville, S=Florida, C=US, SERIALNUMBER=L16000106119, OID.1.3.6.1.4.1.311.60.2.1.2=Florida, OID.1.3.6.1.4.1.311.60.2.1.3=US, OID.2.5.4.15=Private Organization
                    Version:3
                    Thumbprint MD5:ABD40EF42FACAAE2500E04A7C3A05644
                    Thumbprint SHA-1:E52631F3A497896894CABCB6E1B18E734BE09342
                    Thumbprint SHA-256:B4E4E6202977829E9ADF73DB66C49386E5EBBCFA19499A58C7A45D38613D871C
                    Serial:0D4ED820E34466C1DB3375E3AD1937FF
                    Instruction
                    call 00007F5D1CB648D3h
                    jmp 00007F5D1CB63D9Fh
                    push ebp
                    mov ebp, esp
                    push dword ptr [ebp+08h]
                    call 00007F5D1CB64215h
                    pop ecx
                    pop ebp
                    ret
                    push ebp
                    mov ebp, esp
                    test byte ptr [ebp+08h], 00000001h
                    push esi
                    mov esi, ecx
                    mov dword ptr [esi], 006D1CD4h
                    je 00007F5D1CB63F2Ch
                    push 0000000Ch
                    push esi
                    call 00007F5D1CB63EFDh
                    pop ecx
                    pop ecx
                    mov eax, esi
                    pop esi
                    pop ebp
                    retn 0004h
                    push ebp
                    mov ebp, esp
                    jmp 00007F5D1CB63F2Fh
                    push dword ptr [ebp+08h]
                    call 00007F5D1CB96053h
                    pop ecx
                    test eax, eax
                    je 00007F5D1CB63F31h
                    push dword ptr [ebp+08h]
                    call 00007F5D1CB911CEh
                    pop ecx
                    test eax, eax
                    je 00007F5D1CB63F08h
                    pop ebp
                    ret
                    cmp dword ptr [ebp+08h], FFFFFFFFh
                    je 00007F5D1CB64BF8h
                    jmp 00007F5D1CB4FDC3h
                    push ebp
                    mov ebp, esp
                    mov eax, dword ptr [007EC06Ch]
                    and eax, 1Fh
                    push 00000020h
                    pop ecx
                    sub ecx, eax
                    mov eax, dword ptr [ebp+08h]
                    ror eax, cl
                    xor eax, dword ptr [007EC06Ch]
                    pop ebp
                    ret
                    push ebp
                    mov ebp, esp
                    mov eax, dword ptr [ebp+08h]
                    push esi
                    mov ecx, dword ptr [eax+3Ch]
                    add ecx, eax
                    movzx eax, word ptr [ecx+14h]
                    lea edx, dword ptr [ecx+18h]
                    add edx, eax
                    movzx eax, word ptr [ecx+06h]
                    imul esi, eax, 28h
                    add esi, edx
                    cmp edx, esi
                    je 00007F5D1CB63F3Bh
                    mov ecx, dword ptr [ebp+0Ch]
                    cmp ecx, dword ptr [edx+0Ch]
                    jc 00007F5D1CB63F2Ch
                    mov eax, dword ptr [edx+08h]
                    add eax, dword ptr [edx+0Ch]
                    cmp ecx, eax
                    jc 00007F5D1CB63F2Eh
                    add edx, 28h
                    cmp edx, esi
                    jne 00007F5D1CB63F0Ch
                    xor eax, eax
                    pop esi
                    pop ebp
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x3e8b6c0x154.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x4630000x83658.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x4e88000x2f78.reloc
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e70000x27370.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x3b50400x54.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x3b51380x18.rdata
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3b50980x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x2cd0000x70c.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x2cbe2c0x2cc0003339be8f888abfeffc46de3220b43eb8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x2cd0000x11e36c0x11e400705bbe9d4e6b83e6c21146b4e5654fbcFalse0.3312218545305677data6.072282917025936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x3ec0000x76b740x1a200fd9ccb7d2e5e076136cc28819c8447dcFalse0.23657109748803828DOS executable (block device driver pyright)5.114446923921056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x4630000x836580x838001138008a95a7b1e30c435570d5908d3eFalse0.511757738236692data6.405633499821989IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x4e70000x606000x6060024f9cce49c9de2ed8592f872d0b8d318False0.5834270630674449data7.278306055320921IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    FONT0x4642200x13e0cTrueType Font data, 18 tables, 1st "FFTM", 30 names, Macintosh0.46435765168263327
                    FONT0x47802c0x13fe8TrueType Font data, 18 tables, 1st "FFTM", 30 names, Macintosh0.4684722086548794
                    FONT0x48c0140x171a8TrueType Font data, 18 tables, 1st "FFTM", 32 names, Macintosh0.4292733958914532
                    JSON0x4a31bc0x386JSON data0.40022172949002216
                    JSON0x4a35440x7feJSON data0.31573802541544477
                    JSON0x4a3d440x6f2JSON data0.3233970753655793
                    JSON0x4a44380x73dJSON data0.3135456017269293
                    JSON0x4a4b780xd7bJSON data0.275282526803825
                    JSON0x4a58f40x19aJSON data0.5414634146341464
                    PNG0x4a5a900x94cPNG image data, 428 x 343, 8-bit colormap, non-interlaced0.9857142857142858
                    PNG0x4a63dc0x5e9PNG image data, 408 x 108, 8-bit colormap, non-interlaced1.004626569729015
                    PNG0x4a69c80xd822PNG image data, 220 x 449, 8-bit colormap, non-interlaced1.0004699078257726
                    PNG0x4b41ec0xd8c4PNG image data, 220 x 449, 8-bit colormap, non-interlaced1.00046853600519
                    PNG0x4c1ab00x174PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.0295698924731183
                    PNG0x4c1c240x154PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.011764705882353
                    PNG0x4c1d780xf2PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.0082644628099173
                    PNG0x4c1e6c0x13fPNG image data, 165 x 36, 8-bit/color RGBA, non-interlaced0.8495297805642633
                    PNG0x4c1fac0x165PNG image data, 165 x 36, 8-bit/color RGBA, non-interlaced0.834733893557423
                    PNG0x4c21140x165PNG image data, 165 x 36, 8-bit/color RGBA, non-interlaced0.834733893557423
                    PNG0x4c227c0x136PNG image data, 165 x 36, 8-bit/color RGBA, non-interlaced0.8451612903225807
                    PNG0x4c23b40x170PNG image data, 165 x 36, 8-bit/color RGBA, non-interlaced0.8396739130434783
                    PNG0x4c25240x119PNG image data, 92 x 36, 8-bit/color RGBA, non-interlaced0.8718861209964412
                    PNG0x4c26400x149PNG image data, 92 x 36, 8-bit/color RGBA, non-interlaced0.9300911854103343
                    PNG0x4c278c0x149PNG image data, 92 x 36, 8-bit/color RGBA, non-interlaced0.9300911854103343
                    PNG0x4c28d80x11dPNG image data, 92 x 36, 8-bit/color RGBA, non-interlaced0.8736842105263158
                    PNG0x4c29f80x14fPNG image data, 92 x 36, 8-bit/color RGBA, non-interlaced0.9253731343283582
                    PNG0x4c2b480xb3PNG image data, 21 x 19, 8-bit/color RGBA, non-interlaced0.994413407821229
                    PNG0x4c2bfc0xd2PNG image data, 21 x 19, 8-bit/color RGBA, non-interlaced1.0095238095238095
                    PNG0x4c2cd00x90PNG image data, 21 x 19, 8-bit/color RGBA, non-interlaced0.9722222222222222
                    PNG0x4c2d600x93PNG image data, 21 x 19, 8-bit/color RGBA, non-interlaced0.9931972789115646
                    PNG0x4c2df40x11cPNG image data, 11 x 11, 8-bit/color RGBA, non-interlaced1.017605633802817
                    PNG0x4c2f100xd0PNG image data, 11 x 10, 8-bit/color RGBA, non-interlaced0.9903846153846154
                    PNG0x4c2fe00x23d5PNG image data, 738 x 468, 8-bit/color RGBA, non-interlaced0.8771394309386242
                    PNG0x4c53b80x139PNG image data, 451 x 22, 8-bit/color RGBA, non-interlaced0.9648562300319489
                    PNG0x4c54f40x169PNG image data, 451 x 22, 8-bit/color RGBA, non-interlaced0.9889196675900277
                    PNG0x4c56600x133PNG image data, 362 x 22, 8-bit/color RGBA, non-interlaced0.9804560260586319
                    PNG0x4c57940x16aPNG image data, 362 x 22, 8-bit/color RGBA, non-interlaced1.0
                    PNG0x4c59000x27bPNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.0173228346456693
                    PNG0x4c5b7c0x27ePNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.0172413793103448
                    PNG0x4c5dfc0x356PNG image data, 20 x 20, 8-bit/color RGBA, non-interlaced1.0128805620608898
                    STRINGS0x4c61540x4621data0.4167548599119924
                    RT_ICON0x4ca7780x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.05023364485981308
                    RT_ICON0x4dafa00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.33156028368794327
                    RT_ICON0x4db4080x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 2835 x 2835 px/m0.2442622950819672
                    RT_ICON0x4dbd900x2754PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9887763210170838
                    RT_ICON0x4de4e40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.18198874296435272
                    RT_ICON0x4df58c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.12282157676348547
                    RT_ICON0x4e1b340x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.09659896079357581
                    RT_GROUP_ICON0x4e5d5c0x68data0.7692307692307693
                    RT_VERSION0x4e5dc40x344data0.42822966507177035
                    RT_MANIFEST0x4e61080x550ASCII text, with CRLF line terminatorsEnglishUnited States0.42573529411764705
                    DLLImport
                    UIAutomationCore.DLLUiaHostProviderFromHwnd, UiaReturnRawElementProvider, UiaRaiseAutomationPropertyChangedEvent, UiaRaiseAutomationEvent, UiaClientsAreListening
                    MSIMG32.dllAlphaBlend
                    RPCRT4.dllUuidToStringA, RpcStringFreeA, UuidCreate
                    WS2_32.dllbind, socket, freeaddrinfo, getaddrinfo, WSASetLastError, htons, WSACleanup, WSAStartup, connect, htonl, WSAGetLastError, gethostname, closesocket, shutdown, ntohl, getpeername, getsockname, getsockopt, ntohs, setsockopt, WSAIoctl, recvfrom, sendto, accept, listen, __WSAFDIsSet, select, ioctlsocket, send, recv
                    VERSION.dllGetFileVersionInfoSizeW, VerQueryValueW, GetFileVersionInfoW
                    KERNEL32.dllGetThreadPriority, GetLogicalProcessorInformation, CreateTimerQueueTimer, ChangeTimerQueueTimer, DeleteTimerQueueTimer, GetNumaHighestNodeNumber, GetProcessAffinityMask, SetThreadAffinityMask, RegisterWaitForSingleObject, UnregisterWait, GetThreadTimes, FreeLibraryAndExitThread, GetModuleFileNameW, GetModuleHandleA, LoadLibraryExW, VirtualAlloc, VirtualProtect, VirtualFree, ReleaseSemaphore, InterlockedPopEntrySList, InterlockedPushEntrySList, InterlockedFlushSList, QueryDepthSList, UnregisterWaitEx, WaitForSingleObject, RtlUnwind, ExitProcess, GetModuleHandleExW, GetStdHandle, GetFileType, GetModuleFileNameA, WriteConsoleW, ExitThread, ResumeThread, WriteFile, GetACP, SetConsoleCtrlHandler, HeapReAlloc, FlushFileBuffers, GetConsoleCP, GetConsoleMode, OutputDebugStringA, GetDateFormatW, GetTimeFormatW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, ReadFile, ReadConsoleW, SetFilePointerEx, GetTimeZoneInformation, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, CreateThread, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetStdHandle, HeapSize, CreateFileW, SetEndOfFile, GetTickCount64, SleepEx, PeekNamedPipe, WaitForMultipleObjects, ExpandEnvironmentStringsA, FormatMessageA, VerSetConditionMask, GetSystemDirectoryA, LoadLibraryA, VerifyVersionInfoA, CreateFileA, GetFileSizeEx, InitializeCriticalSection, GetEnvironmentVariableW, SetCurrentDirectoryW, GetCurrentDirectoryW, CreateDirectoryW, DeleteFileW, FindFirstFileW, GetDiskFreeSpaceExW, GetFileAttributesW, GetFileAttributesExW, GetFileInformationByHandle, GetFileTime, GetFullPathNameW, RemoveDirectoryW, SetFileAttributesW, SetFileTime, DeviceIoControl, MoveFileExW, AreFileApisANSI, OpenEventA, SetWaitableTimer, GetSystemInfo, CreateWaitableTimerA, DeactivateActCtx, ActivateActCtx, CreateActCtxW, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, SystemTimeToTzSpecificLocalTime, GetDriveTypeW, lstrlenW, VirtualUnlock, ReleaseMutex, CreateMutexA, GlobalFree, GetExitCodeProcess, OpenThread, CreateFiber, VirtualQuery, MoveFileW, ConvertThreadToFiber, CreateFiberEx, WaitNamedPipeW, SetFileValidData, IsBadReadPtr, GlobalMemoryStatus, Module32NextW, VerifyVersionInfoW, SignalObjectAndWait, CreateTimerQueue, OutputDebugStringW, TerminateProcess, IsProcessorFeaturePresent, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, InitializeSListHead, GetCurrentProcessId, ResetEvent, GetStringTypeW, GetLocaleInfoW, LCMapStringW, CompareStringW, GetCPInfo, SetThreadPriority, MultiByteToWideChar, GetSystemTimeAsFileTime, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, CreateEventW, InitializeCriticalSectionAndSpinCount, SetLastError, EncodePointer, GetExitCodeThread, SwitchToThread, Sleep, WaitForSingleObjectEx, DuplicateHandle, GetCurrentThreadId, TryEnterCriticalSection, LeaveCriticalSection, EnterCriticalSection, QueryPerformanceFrequency, QueryPerformanceCounter, WideCharToMultiByte, GetCurrentThread, GetCurrentProcess, LocalFree, OpenProcess, GetVersionExW, LocalAlloc, FindResourceW, LoadResource, LockResource, SizeofResource, CreateEventA, GetProcessHeap, HeapAlloc, CloseHandle, SetEvent, SystemTimeToFileTime, GetComputerNameW, lstrcpynA, GetFileSize, GetThreadContext, GetLocalTime, HeapFree, GetUserDefaultLangID, GetTickCount, FreeLibrary, GetModuleHandleW, DeleteCriticalSection, GetProcAddress, DecodePointer, LoadLibraryW, RaiseException, GetLastError, InitializeCriticalSectionEx, ConvertFiberToThread, ReadConsoleA, SetConsoleMode, GetOEMCP, Module32FirstW, Process32Next, DeleteFileA, FileTimeToSystemTime, GetTempPathA, CreateToolhelp32Snapshot, SwitchToFiber, SuspendThread, IsBadStringPtrA, Thread32First, GetCompressedFileSizeW, SetFilePointer, Thread32Next, GetProcessId, DeleteFiber, GetVolumeInformationW, SetNamedPipeHandleState, Process32First, IsBadWritePtr, RtlCaptureContext, GetShortPathNameW, GetDiskFreeSpaceW
                    USER32.dllAllowSetForegroundWindow, GetDesktopWindow, MessageBoxA, GetDC, DrawTextW, GetWindowLongW, DefWindowProcW, AdjustWindowRectEx, GetWindowRect, DestroyWindow, SetWindowPos, MessageBoxW, CreateWindowExW, SendMessageW, GetSystemMetrics, SetWindowTextW, RegisterClassExW, ShowWindow, DispatchMessageW, SetTimer, PeekMessageW, TrackMouseEvent, TranslateMessage, LoadIconW, LoadCursorW, SetCapture, GetWindowDC, SetWindowLongW, UpdateLayeredWindow, PostQuitMessage, ReleaseCapture, InvalidateRect, IsIconic, ReleaseDC, GetCursorPos, BeginPaint, EndPaint, GetKeyState, GetUserObjectInformationW, ClientToScreen, PostMessageW, GetForegroundWindow, GetActiveWindow, GetShellWindow, GetWindowThreadProcessId, CharLowerA, SetFocus, MoveWindow, ScreenToClient, GetProcessWindowStation
                    GDI32.dllCreateDIBSection, GetObjectW, DeleteObject, AddFontMemResourceEx, EnumFontFamiliesExW, CreateFontW, GetStockObject, SetBkColor, RoundRect, SelectObject, GetLayout, SetLayout, DeleteDC, SetTextColor, SetBkMode, SetMapMode, SetTextAlign, CreateCompatibleDC
                    ADVAPI32.dllGetTokenInformation, RegDeleteValueA, OpenServiceW, QueryServiceConfigW, OpenProcessToken, RegSetValueExA, RegCreateKeyExA, CryptEnumProvidersA, CryptSignHashA, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptAcquireContextW, ReportEventA, RegisterEventSourceA, DeregisterEventSource, RegGetValueW, RegSetValueExW, SetEntriesInAclW, ConvertSecurityDescriptorToStringSecurityDescriptorW, SetNamedSecurityInfoW, GetNamedSecurityInfoW, GetFileSecurityW, MapGenericMask, BuildTrusteeWithSidW, RegQueryValueExW, LookupPrivilegeValueW, AdjustTokenPrivileges, ConvertStringSecurityDescriptorToSecurityDescriptorW, GetUserNameW, DuplicateTokenEx, OpenSCManagerW, RegQueryValueExA, CloseServiceHandle, ConvertSidToStringSidA, RegCloseKey, RegOpenKeyExA, OpenThreadToken, DuplicateToken, CryptEncrypt, CryptImportKey, CryptDestroyKey, CryptDestroyHash, CryptHashData, CryptCreateHash, CryptGenRandom, CryptGetHashParam, CryptReleaseContext, CryptAcquireContextA, AccessCheck, AllocateAndInitializeSid
                    SHELL32.dllSHGetFolderPathW, ShellExecuteExA, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, ShellExecuteExW, CommandLineToArgvW, FindExecutableA
                    ole32.dllCoTaskMemFree, CoCreateInstance
                    WINTRUST.dllWinVerifyTrust
                    CRYPT32.dllCertOpenStore, CertCloseStore, CertFindCertificateInStore, CertFreeCertificateContext, CryptStringToBinaryA, CertAddCertificateContextToStore, CertGetNameStringA, CryptQueryObject, CertCreateCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CryptMsgClose, CryptMsgGetParam, CertGetNameStringW, CertEnumCertificatesInStore, CertDuplicateCertificateContext, CertGetCertificateContextProperty, CertFreeCertificateChainEngine
                    WININET.dllHttpSendRequestA, InternetCloseHandle, InternetSetStatusCallbackA, InternetOpenA, InternetReadFileExA, InternetSetCookieW, InternetSetOptionA, InternetCrackUrlA, HttpOpenRequestA, HttpQueryInfoA, InternetConnectA
                    WINHTTP.dllWinHttpCloseHandle, WinHttpGetIEProxyConfigForCurrentUser, WinHttpGetProxyForUrl, WinHttpOpen
                    OLEAUT32.dllVariantClear, SysAllocString, SafeArrayCreateVector, SafeArrayPutElement
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 3, 2024 16:50:06.851120949 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:06.851164103 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:06.851234913 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:06.862397909 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:06.862425089 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.490022898 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.490217924 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:07.544553041 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:07.544576883 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.544873953 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.545075893 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:07.548033953 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:07.588506937 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.744431973 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.744460106 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.744510889 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.744549036 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:07.744560003 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.744609118 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:07.744616985 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.744657993 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:07.800107002 CEST49707443192.168.2.6149.154.167.99
                    Jul 3, 2024 16:50:07.800127029 CEST44349707149.154.167.99192.168.2.6
                    Jul 3, 2024 16:50:07.856132030 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:07.861675024 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:07.861752987 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:07.862127066 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:07.867729902 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:08.536614895 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:08.536689997 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:08.536698103 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:08.536747932 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:09.584213018 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:09.589410067 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:09.773013115 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:09.773178101 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:09.773782015 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:09.779989958 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:10.212049961 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:10.212126970 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:10.216794014 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:10.221806049 CEST543249710116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:10.221898079 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:10.222265005 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:10.229011059 CEST543249710116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:10.875519991 CEST543249710116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:10.875598907 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:10.876096964 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:10.878113031 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:10.881074905 CEST543249710116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:10.883164883 CEST543249710116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:11.508410931 CEST543249710116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:11.508620977 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:11.511955976 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:11.512543917 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:11.517471075 CEST543249708116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:11.517570019 CEST497085432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:11.517963886 CEST543249711116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:11.518029928 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:11.518373966 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:11.523665905 CEST543249711116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:12.191543102 CEST543249711116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:12.191685915 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.192312956 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.194422007 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.197108030 CEST543249711116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:12.199697971 CEST543249711116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:12.851542950 CEST543249711116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:12.851681948 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.853575945 CEST543249711116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:12.853634119 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.855268002 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.855768919 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.860884905 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:12.860961914 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.861140013 CEST543249710116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:12.861187935 CEST497105432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.861318111 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:12.866303921 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:13.517237902 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:13.517378092 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:13.517925978 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:13.520028114 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:13.523403883 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:13.525276899 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.031876087 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.031896114 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.031913996 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.032130957 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.032130957 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.032664061 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.032676935 CEST543249712116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.032704115 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.032721043 CEST497125432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.048018932 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.048861027 CEST497135432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.060971022 CEST543249713116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.061060905 CEST497135432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.061598063 CEST543249711116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.061650991 CEST497115432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.067699909 CEST497135432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.079387903 CEST543249713116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.731857061 CEST543249713116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.731976032 CEST497135432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.732425928 CEST497135432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.734221935 CEST497135432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:14.738045931 CEST543249713116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:14.739854097 CEST543249713116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:15.377509117 CEST543249713116.202.180.70192.168.2.6
                    Jul 3, 2024 16:50:15.377568960 CEST497135432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:21.073508978 CEST497135432192.168.2.6116.202.180.70
                    Jul 3, 2024 16:50:21.073597908 CEST497125432192.168.2.6116.202.180.70
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 3, 2024 16:50:06.831523895 CEST5786353192.168.2.61.1.1.1
                    Jul 3, 2024 16:50:06.846668959 CEST53578631.1.1.1192.168.2.6
                    Jul 3, 2024 16:50:31.364928961 CEST5359379162.159.36.2192.168.2.6
                    Jul 3, 2024 16:50:31.838219881 CEST6218253192.168.2.61.1.1.1
                    Jul 3, 2024 16:50:31.851706028 CEST53621821.1.1.1192.168.2.6
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 3, 2024 16:50:06.831523895 CEST192.168.2.61.1.1.10x8b9Standard query (0)t.meA (IP address)IN (0x0001)false
                    Jul 3, 2024 16:50:31.838219881 CEST192.168.2.61.1.1.10xfe3Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Jul 3, 2024 16:50:06.846668959 CEST1.1.1.1192.168.2.60x8b9No error (0)t.me149.154.167.99A (IP address)IN (0x0001)false
                    Jul 3, 2024 16:50:31.851706028 CEST1.1.1.1192.168.2.60xfe3Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                    • t.me
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.649707149.154.167.994435316C:\Users\user\Desktop\file.exe
                    TimestampBytes transferredDirectionData
                    2024-07-03 14:50:07 UTC85OUTGET /bu77un HTTP/1.1
                    Host: t.me
                    Connection: Keep-Alive
                    Cache-Control: no-cache
                    2024-07-03 14:50:07 UTC512INHTTP/1.1 200 OK
                    Server: nginx/1.18.0
                    Date: Wed, 03 Jul 2024 14:50:07 GMT
                    Content-Type: text/html; charset=utf-8
                    Content-Length: 12323
                    Connection: close
                    Set-Cookie: stel_ssid=0ea872b77550e6bde8_12601486500904257718; expires=Thu, 04 Jul 2024 14:50:07 GMT; path=/; samesite=None; secure; HttpOnly
                    Pragma: no-cache
                    Cache-control: no-store
                    X-Frame-Options: ALLOW-FROM https://web.telegram.org
                    Content-Security-Policy: frame-ancestors https://web.telegram.org
                    Strict-Transport-Security: max-age=35768000
                    2024-07-03 14:50:07 UTC12323INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 62 75 37 37 75 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 3c 73 63 72 69 70 74 3e 74 72 79 7b 69 66 28 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 21 3d 6e 75 6c 6c 26 26 77 69 6e 64 6f 77 21 3d 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74 29 7b 77 69 6e 64 6f 77 2e 70 61 72 65 6e 74
                    Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @bu77un</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <script>try{if(window.parent!=null&&window!=window.parent){window.parent


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:10:49:55
                    Start date:03/07/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0xe00000
                    File size:5'158'776 bytes
                    MD5 hash:06E9439BEABD1813FF13295ADBBA48FF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000002.2334234419.0000000000976000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2336053531.0000000002FA5000.00000002.10000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2335861856.0000000002DF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:6
                    Start time:10:50:15
                    Start date:03/07/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5316 -s 2068
                    Imagebase:0x530000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:10.8%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:6.6%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:34
                      execution_graph 35723 2f92891 10 API calls 32996 976332 32997 976357 32996->32997 32998 976441 32996->32998 33029 978bb4 32997->33029 33008 97760d 32998->33008 33001 97636f 33002 978bb4 LoadLibraryA 33001->33002 33007 9763e7 33001->33007 33003 9763b1 33002->33003 33004 978bb4 LoadLibraryA 33003->33004 33005 9763cd 33004->33005 33006 978bb4 LoadLibraryA 33005->33006 33006->33007 33009 978bb4 LoadLibraryA 33008->33009 33010 977630 33009->33010 33011 978bb4 LoadLibraryA 33010->33011 33012 977648 33011->33012 33013 978bb4 LoadLibraryA 33012->33013 33014 977666 33013->33014 33015 97767b VirtualAlloc 33014->33015 33027 97768f 33014->33027 33018 9776a9 33015->33018 33015->33027 33016 978bb4 LoadLibraryA 33017 977727 33016->33017 33019 97777d 33017->33019 33017->33027 33033 9789bb 33017->33033 33018->33016 33018->33027 33020 978bb4 LoadLibraryA 33019->33020 33021 9777df 33019->33021 33019->33027 33020->33019 33021->33027 33028 977841 33021->33028 33062 97679d LoadLibraryA 33021->33062 33024 97782a 33024->33027 33063 976898 LoadLibraryA 33024->33063 33027->33007 33028->33027 33037 977d3d 33028->33037 33030 978bcb 33029->33030 33031 978bf2 33030->33031 35688 976cb9 LoadLibraryA 33030->35688 33031->33001 33035 9789d0 33033->33035 33034 978a46 LoadLibraryA 33036 978a50 33034->33036 33035->33034 33035->33036 33036->33017 33038 977d78 33037->33038 33039 977dbf NtCreateSection 33038->33039 33040 977de4 33038->33040 33059 9783ec 33038->33059 33039->33040 33039->33059 33041 977e79 NtMapViewOfSection 33040->33041 33040->33059 33050 977e99 33041->33050 33042 9781c2 VirtualAlloc 33053 978204 33042->33053 33043 9789bb LoadLibraryA 33043->33050 33044 9789bb LoadLibraryA 33048 978120 33044->33048 33045 9782b5 VirtualProtect 33046 978380 VirtualProtect 33045->33046 33055 9782d5 33045->33055 33052 9783af 33046->33052 33047 9781be 33047->33042 33048->33042 33048->33044 33048->33047 33109 978a59 LoadLibraryA 33048->33109 33049 978a59 LoadLibraryA 33049->33050 33050->33043 33050->33048 33050->33049 33050->33059 33051 9784fa 33051->33059 33064 2f9a76b 6 API calls 33051->33064 33096 2f9aad6 33051->33096 33052->33051 33052->33059 33110 97876e LoadLibraryA 33052->33110 33053->33045 33057 9782a2 NtMapViewOfSection 33053->33057 33053->33059 33055->33046 33058 97835a VirtualProtect 33055->33058 33057->33045 33057->33059 33058->33055 33059->33027 33062->33024 33063->33028 33065 2f9a7bc GetProcAddress GetProcAddress 33064->33065 33066 2f9a7e2 17 API calls 33064->33066 33065->33066 33111 2f82339 33066->33111 33074 2f9a955 33213 2f9185b 33074->33213 33076 2f9a975 33077 2f9185b 4 API calls 33076->33077 33078 2f9a97c 33077->33078 33079 2f9185b 4 API calls 33078->33079 33080 2f9a983 33079->33080 33221 2f9177a 33080->33221 33082 2f9a98c 33083 2f9a9a4 12 API calls 33082->33083 33084 2f9aa04 33083->33084 33085 2f9aa0d 6 API calls 33084->33085 33086 2f9ab51 12 API calls 33084->33086 33605 2f9193a 33085->33605 33225 2f98fd9 33086->33225 33090 2f9aa45 OpenEventA 33091 2f9aad8 8 API calls 33090->33091 33092 2f9aa5c 6 API calls 33090->33092 33093 2f9ab1c 6 API calls 33091->33093 33606 2f9193a 33092->33606 33093->33084 33095 2f9aa94 7 API calls 33095->33086 33097 2f9ab1c 6 API calls 33096->33097 33098 2f9aa04 33097->33098 33099 2f9aa0d 6 API calls 33098->33099 33100 2f9ab51 12 API calls 33098->33100 35686 2f9193a 33099->35686 33102 2f98fd9 1082 API calls 33100->33102 33103 2f9abb6 32 API calls 33102->33103 33104 2f9aa45 OpenEventA 33105 2f9aad8 8 API calls 33104->33105 33106 2f9aa5c 6 API calls 33104->33106 33105->33097 35687 2f9193a 33106->35687 33108 2f9aa94 7 API calls 33108->33100 33109->33048 33110->33051 33607 2f84239 LocalAlloc 33111->33607 33113 2f8234d 33114 2f84239 11 API calls 33113->33114 33115 2f82366 33114->33115 33116 2f84239 11 API calls 33115->33116 33117 2f8237f 33116->33117 33118 2f84239 11 API calls 33117->33118 33119 2f82398 33118->33119 33120 2f84239 11 API calls 33119->33120 33121 2f823b1 33120->33121 33122 2f84239 11 API calls 33121->33122 33123 2f823ca 33122->33123 33124 2f84239 11 API calls 33123->33124 33125 2f823e3 33124->33125 33126 2f84239 11 API calls 33125->33126 33127 2f823fc 33126->33127 33128 2f84239 11 API calls 33127->33128 33129 2f82415 33128->33129 33130 2f84239 11 API calls 33129->33130 33131 2f8242e 33130->33131 33132 2f84239 11 API calls 33131->33132 33133 2f82447 33132->33133 33134 2f84239 11 API calls 33133->33134 33135 2f82460 33134->33135 33136 2f84239 11 API calls 33135->33136 33137 2f82479 33136->33137 33138 2f84239 11 API calls 33137->33138 33139 2f82492 33138->33139 33140 2f84239 11 API calls 33139->33140 33141 2f824ab 33140->33141 33142 2f84239 11 API calls 33141->33142 33143 2f824c4 33142->33143 33144 2f84239 11 API calls 33143->33144 33145 2f824dd 33144->33145 33146 2f84239 11 API calls 33145->33146 33147 2f824f6 33146->33147 33148 2f84239 11 API calls 33147->33148 33149 2f8250f 33148->33149 33150 2f84239 11 API calls 33149->33150 33151 2f82528 33150->33151 33152 2f84239 11 API calls 33151->33152 33153 2f82541 33152->33153 33154 2f84239 11 API calls 33153->33154 33155 2f8255a 33154->33155 33156 2f84239 11 API calls 33155->33156 33157 2f82573 33156->33157 33158 2f84239 11 API calls 33157->33158 33159 2f8258c 33158->33159 33160 2f84239 11 API calls 33159->33160 33161 2f825a5 33160->33161 33162 2f84239 11 API calls 33161->33162 33163 2f825be 33162->33163 33164 2f84239 11 API calls 33163->33164 33165 2f825d7 33164->33165 33166 2f84239 11 API calls 33165->33166 33167 2f825f0 33166->33167 33168 2f84239 11 API calls 33167->33168 33169 2f82609 33168->33169 33170 2f84239 11 API calls 33169->33170 33171 2f82622 33170->33171 33172 2f84239 11 API calls 33171->33172 33173 2f8263b 33172->33173 33174 2f84239 11 API calls 33173->33174 33175 2f82654 33174->33175 33176 2f84239 11 API calls 33175->33176 33177 2f8266d 33176->33177 33178 2f84239 11 API calls 33177->33178 33179 2f82686 33178->33179 33180 2f84239 11 API calls 33179->33180 33181 2f8269f 33180->33181 33182 2f84239 11 API calls 33181->33182 33183 2f826b8 33182->33183 33184 2f84239 11 API calls 33183->33184 33185 2f826d1 33184->33185 33186 2f84239 11 API calls 33185->33186 33187 2f826ea 33186->33187 33188 2f84239 11 API calls 33187->33188 33189 2f82703 33188->33189 33190 2f84239 11 API calls 33189->33190 33191 2f8271c 6 API calls 33190->33191 33192 2f9ad16 33191->33192 33612 2f9acf3 GetPEB 33192->33612 33194 2f9ad1e 33195 2f9af2b LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 33194->33195 33196 2f9ad30 33194->33196 33197 2f9af89 GetProcAddress 33195->33197 33198 2f9afa0 33195->33198 33199 2f9ad41 21 API calls 33196->33199 33197->33198 33200 2f9afa9 GetProcAddress GetProcAddress 33198->33200 33201 2f9afd7 33198->33201 33199->33195 33200->33201 33202 2f9afe0 GetProcAddress 33201->33202 33203 2f9aff7 33201->33203 33202->33203 33204 2f9b000 GetProcAddress 33203->33204 33205 2f9b017 33203->33205 33204->33205 33206 2f9a8b3 12 API calls 33205->33206 33207 2f9b020 GetProcAddress GetProcAddress 33205->33207 33208 2f91668 33206->33208 33207->33206 33209 2f91677 33208->33209 33210 2f916ad 6 API calls 33209->33210 33211 2f9169f lstrcpy 33209->33211 33212 2f91bec GetProcessHeap RtlAllocateHeap GetUserNameA 33210->33212 33211->33210 33212->33074 33613 2f91648 33213->33613 33215 2f9186c lstrlen 33217 2f91888 33215->33217 33216 2f918ba 33614 2f916b4 33216->33614 33217->33216 33220 2f918a0 lstrcpy lstrcat 33217->33220 33219 2f918c6 33219->33076 33220->33216 33223 2f91795 33221->33223 33222 2f917d9 33222->33082 33223->33222 33224 2f917c9 lstrcpy 33223->33224 33224->33222 33226 2f98fe6 33225->33226 33227 2f91668 lstrcpy 33226->33227 33228 2f98ff8 33227->33228 33618 2f91715 lstrlen 33228->33618 33231 2f91715 2 API calls 33232 2f99025 33231->33232 33622 2f82727 33232->33622 33236 2f9922c 33238 2f91668 lstrcpy 33236->33238 33433 2f995ac 33236->33433 33240 2f99249 33238->33240 33239 2f995d7 33241 2f9177a lstrcpy 33239->33241 33242 2f9185b 4 API calls 33240->33242 33243 2f995e2 33241->33243 33244 2f99260 33242->33244 33247 2f91668 lstrcpy 33243->33247 33245 2f9177a lstrcpy 33244->33245 33246 2f9926c 33245->33246 33249 2f9185b 4 API calls 33246->33249 33248 2f995fd 33247->33248 33250 2f9185b 4 API calls 33248->33250 33251 2f9928e 33249->33251 33252 2f99620 33250->33252 33253 2f9177a lstrcpy 33251->33253 34223 2f917e0 33252->34223 33255 2f9929a 33253->33255 33258 2f9185b 4 API calls 33255->33258 33256 2f99627 33257 2f9177a lstrcpy 33256->33257 33260 2f99633 33257->33260 33259 2f992bc 33258->33259 33261 2f9177a lstrcpy 33259->33261 33263 2f99656 CreateDirectoryA 33260->33263 33262 2f992c8 33261->33262 33265 2f9185b 4 API calls 33262->33265 34229 2f8134c 33263->34229 33267 2f992ea 33265->33267 33268 2f9177a lstrcpy 33267->33268 33270 2f992f6 33268->33270 33274 2f9185b 4 API calls 33270->33274 33271 2f99677 34341 2f9a4cb 33271->34341 33273 2f99686 33277 2f9177a lstrcpy 33273->33277 33275 2f99318 33274->33275 33276 2f9177a lstrcpy 33275->33276 33278 2f99324 33276->33278 33279 2f996a0 33277->33279 33283 2f9185b 4 API calls 33278->33283 33280 2f9177a lstrcpy 33279->33280 33281 2f996af 33280->33281 33282 2f916b4 lstrcpy 33281->33282 33284 2f996be 33282->33284 33285 2f99346 33283->33285 33286 2f9185b 4 API calls 33284->33286 33287 2f9177a lstrcpy 33285->33287 33288 2f996d5 33286->33288 33289 2f99352 33287->33289 33290 2f9177a lstrcpy 33288->33290 33292 2f9185b 4 API calls 33289->33292 33291 2f996e1 33290->33291 33295 2f917e0 3 API calls 33291->33295 33293 2f99374 33292->33293 33294 2f9177a lstrcpy 33293->33294 33296 2f99380 33294->33296 33297 2f99705 33295->33297 33299 2f9185b 4 API calls 33296->33299 33298 2f9177a lstrcpy 33297->33298 33301 2f99711 33298->33301 33300 2f993a2 33299->33300 33302 2f9177a lstrcpy 33300->33302 33303 2f9972c InternetOpenA 33301->33303 33304 2f993ae 33302->33304 34348 2f9193a 33303->34348 33308 2f9185b 4 API calls 33304->33308 33306 2f99746 InternetOpenA 33307 2f916b4 lstrcpy 33306->33307 33309 2f99767 33307->33309 33310 2f993d0 33308->33310 33313 2f91668 lstrcpy 33309->33313 33311 2f9177a lstrcpy 33310->33311 33312 2f993dc 33311->33312 33315 2f9185b 4 API calls 33312->33315 33314 2f99777 33313->33314 34349 2f91948 GetWindowsDirectoryA 33314->34349 33317 2f993fe 33315->33317 33319 2f9177a lstrcpy 33317->33319 33321 2f9940a 33319->33321 33320 2f916b4 lstrcpy 33322 2f9978f 33320->33322 33326 2f9185b 4 API calls 33321->33326 34368 2f843fa 33322->34368 33324 2f99795 34508 2f94f8c 33324->34508 33328 2f9942c 33326->33328 33327 2f9979d 33330 2f91668 lstrcpy 33327->33330 33329 2f9177a lstrcpy 33328->33329 33331 2f99438 33329->33331 33332 2f997cc 33330->33332 33335 2f9185b 4 API calls 33331->33335 33333 2f8134c lstrcpy 33332->33333 33334 2f997da 33333->33334 34528 2f858c4 33334->34528 33337 2f9945a 33335->33337 33338 2f9177a lstrcpy 33337->33338 33340 2f99466 33338->33340 33339 2f997e0 34709 2f948a0 33339->34709 33344 2f9185b 4 API calls 33340->33344 33342 2f997e8 33343 2f91668 lstrcpy 33342->33343 33345 2f9980a 33343->33345 33346 2f99488 33344->33346 33347 2f8134c lstrcpy 33345->33347 33348 2f9177a lstrcpy 33346->33348 33349 2f99818 33347->33349 33351 2f99494 33348->33351 33350 2f858c4 39 API calls 33349->33350 33352 2f9981e 33350->33352 33355 2f9185b 4 API calls 33351->33355 34716 2f945d9 33352->34716 33354 2f99826 33356 2f91668 lstrcpy 33354->33356 33357 2f994b6 33355->33357 33358 2f99848 33356->33358 33359 2f9177a lstrcpy 33357->33359 33360 2f8134c lstrcpy 33358->33360 33361 2f994c2 33359->33361 33362 2f99856 33360->33362 33364 2f9185b 4 API calls 33361->33364 33363 2f858c4 39 API calls 33362->33363 33365 2f9985c 33363->33365 33366 2f994e4 33364->33366 34727 2f947a4 33365->34727 33368 2f9177a lstrcpy 33366->33368 33370 2f994f0 33368->33370 33369 2f99864 33371 2f8134c lstrcpy 33369->33371 33374 2f9185b 4 API calls 33370->33374 33372 2f99875 33371->33372 34735 2f951e4 33372->34735 33377 2f99512 33374->33377 33379 2f9177a lstrcpy 33377->33379 33380 2f9951e 33379->33380 33383 2f9185b 4 API calls 33380->33383 33385 2f99540 33383->33385 33387 2f9177a lstrcpy 33385->33387 33389 2f9954c 33387->33389 33392 2f9185b 4 API calls 33389->33392 33394 2f9956e 33392->33394 33396 2f9177a lstrcpy 33394->33396 33409 2f9957a 33396->33409 34206 2f938ba CreateToolhelp32Snapshot Process32First 33409->34206 34215 2f92d64 33433->34215 33605->33090 33606->33095 33608 2f8425e 33607->33608 33609 2f842dd 33608->33609 33610 2f8426d 7 API calls 33608->33610 33611 2f842e7 wcslen wcslen wcslen 33609->33611 33610->33608 33611->33113 33612->33194 33613->33215 33616 2f916d4 33614->33616 33615 2f916fa 33615->33219 33616->33615 33617 2f916ea lstrcpy 33616->33617 33617->33615 33619 2f91733 33618->33619 33620 2f91773 33619->33620 33621 2f91765 lstrcpy 33619->33621 33620->33231 33621->33620 33623 2f84239 11 API calls 33622->33623 33624 2f8273b 33623->33624 33625 2f84239 11 API calls 33624->33625 33626 2f82754 33625->33626 33627 2f84239 11 API calls 33626->33627 33628 2f8276d 33627->33628 33629 2f84239 11 API calls 33628->33629 33630 2f82786 33629->33630 33631 2f84239 11 API calls 33630->33631 33632 2f8279f 33631->33632 33633 2f84239 11 API calls 33632->33633 33634 2f827b8 33633->33634 33635 2f84239 11 API calls 33634->33635 33636 2f827d1 33635->33636 33637 2f84239 11 API calls 33636->33637 33638 2f827ea 33637->33638 33639 2f84239 11 API calls 33638->33639 33640 2f82803 33639->33640 33641 2f84239 11 API calls 33640->33641 33642 2f8281c 33641->33642 33643 2f84239 11 API calls 33642->33643 33644 2f82835 33643->33644 33645 2f84239 11 API calls 33644->33645 33646 2f8284e 33645->33646 33647 2f84239 11 API calls 33646->33647 33648 2f82867 33647->33648 33649 2f84239 11 API calls 33648->33649 33650 2f82880 33649->33650 33651 2f84239 11 API calls 33650->33651 33652 2f82899 33651->33652 33653 2f84239 11 API calls 33652->33653 33654 2f828b2 33653->33654 33655 2f84239 11 API calls 33654->33655 33656 2f828cb 33655->33656 33657 2f84239 11 API calls 33656->33657 33658 2f828e4 33657->33658 33659 2f84239 11 API calls 33658->33659 33660 2f828fd 33659->33660 33661 2f84239 11 API calls 33660->33661 33662 2f82916 33661->33662 33663 2f84239 11 API calls 33662->33663 33664 2f8292f 33663->33664 33665 2f84239 11 API calls 33664->33665 33666 2f82948 33665->33666 33667 2f84239 11 API calls 33666->33667 33668 2f82961 33667->33668 33669 2f84239 11 API calls 33668->33669 33670 2f8297a 33669->33670 33671 2f84239 11 API calls 33670->33671 33672 2f82993 33671->33672 33673 2f84239 11 API calls 33672->33673 33674 2f829ac 33673->33674 33675 2f84239 11 API calls 33674->33675 33676 2f829c5 33675->33676 33677 2f84239 11 API calls 33676->33677 33678 2f829de 33677->33678 33679 2f84239 11 API calls 33678->33679 33680 2f829f7 33679->33680 33681 2f84239 11 API calls 33680->33681 33682 2f82a10 33681->33682 33683 2f84239 11 API calls 33682->33683 33684 2f82a29 33683->33684 33685 2f84239 11 API calls 33684->33685 33686 2f82a42 33685->33686 33687 2f84239 11 API calls 33686->33687 33688 2f82a5b 33687->33688 33689 2f84239 11 API calls 33688->33689 33690 2f82a74 33689->33690 33691 2f84239 11 API calls 33690->33691 33692 2f82a8d 33691->33692 33693 2f84239 11 API calls 33692->33693 33694 2f82aa6 33693->33694 33695 2f84239 11 API calls 33694->33695 33696 2f82abf 33695->33696 33697 2f84239 11 API calls 33696->33697 33698 2f82ad8 33697->33698 33699 2f84239 11 API calls 33698->33699 33700 2f82af1 33699->33700 33701 2f84239 11 API calls 33700->33701 33702 2f82b0a 33701->33702 33703 2f84239 11 API calls 33702->33703 33704 2f82b23 33703->33704 33705 2f84239 11 API calls 33704->33705 33706 2f82b3c 33705->33706 33707 2f84239 11 API calls 33706->33707 33708 2f82b55 33707->33708 33709 2f84239 11 API calls 33708->33709 33710 2f82b6e 33709->33710 33711 2f84239 11 API calls 33710->33711 33712 2f82b87 33711->33712 33713 2f84239 11 API calls 33712->33713 33714 2f82ba0 33713->33714 33715 2f84239 11 API calls 33714->33715 33716 2f82bb9 33715->33716 33717 2f84239 11 API calls 33716->33717 33718 2f82bd2 33717->33718 33719 2f84239 11 API calls 33718->33719 33720 2f82beb 33719->33720 33721 2f84239 11 API calls 33720->33721 33722 2f82c04 33721->33722 33723 2f84239 11 API calls 33722->33723 33724 2f82c1d 33723->33724 33725 2f84239 11 API calls 33724->33725 33726 2f82c36 33725->33726 33727 2f84239 11 API calls 33726->33727 33728 2f82c4f 33727->33728 33729 2f84239 11 API calls 33728->33729 33730 2f82c68 33729->33730 33731 2f84239 11 API calls 33730->33731 33732 2f82c81 33731->33732 33733 2f84239 11 API calls 33732->33733 33734 2f82c9a 33733->33734 33735 2f84239 11 API calls 33734->33735 33736 2f82cb3 33735->33736 33737 2f84239 11 API calls 33736->33737 33738 2f82ccc 33737->33738 33739 2f84239 11 API calls 33738->33739 33740 2f82ce5 33739->33740 33741 2f84239 11 API calls 33740->33741 33742 2f82cfe 33741->33742 33743 2f84239 11 API calls 33742->33743 33744 2f82d17 33743->33744 33745 2f84239 11 API calls 33744->33745 33746 2f82d30 33745->33746 33747 2f84239 11 API calls 33746->33747 33748 2f82d49 33747->33748 33749 2f84239 11 API calls 33748->33749 33750 2f82d62 33749->33750 33751 2f84239 11 API calls 33750->33751 33752 2f82d7b 33751->33752 33753 2f84239 11 API calls 33752->33753 33754 2f82d94 33753->33754 33755 2f84239 11 API calls 33754->33755 33756 2f82dad 33755->33756 33757 2f84239 11 API calls 33756->33757 33758 2f82dc6 33757->33758 33759 2f84239 11 API calls 33758->33759 33760 2f82ddf 33759->33760 33761 2f84239 11 API calls 33760->33761 33762 2f82df8 33761->33762 33763 2f84239 11 API calls 33762->33763 33764 2f82e11 33763->33764 33765 2f84239 11 API calls 33764->33765 33766 2f82e2a 33765->33766 33767 2f84239 11 API calls 33766->33767 33768 2f82e43 33767->33768 33769 2f84239 11 API calls 33768->33769 33770 2f82e5c 33769->33770 33771 2f84239 11 API calls 33770->33771 33772 2f82e75 33771->33772 33773 2f84239 11 API calls 33772->33773 33774 2f82e8e 33773->33774 33775 2f84239 11 API calls 33774->33775 33776 2f82ea7 33775->33776 33777 2f84239 11 API calls 33776->33777 33778 2f82ec0 33777->33778 33779 2f84239 11 API calls 33778->33779 33780 2f82ed9 33779->33780 33781 2f84239 11 API calls 33780->33781 33782 2f82ef2 33781->33782 33783 2f84239 11 API calls 33782->33783 33784 2f82f0b 33783->33784 33785 2f84239 11 API calls 33784->33785 33786 2f82f24 33785->33786 33787 2f84239 11 API calls 33786->33787 33788 2f82f3d 33787->33788 33789 2f84239 11 API calls 33788->33789 33790 2f82f56 33789->33790 33791 2f84239 11 API calls 33790->33791 33792 2f82f6f 33791->33792 33793 2f84239 11 API calls 33792->33793 33794 2f82f88 33793->33794 33795 2f84239 11 API calls 33794->33795 33796 2f82fa1 33795->33796 33797 2f84239 11 API calls 33796->33797 33798 2f82fba 33797->33798 33799 2f84239 11 API calls 33798->33799 33800 2f82fd3 33799->33800 33801 2f84239 11 API calls 33800->33801 33802 2f82fec 33801->33802 33803 2f84239 11 API calls 33802->33803 33804 2f83005 33803->33804 33805 2f84239 11 API calls 33804->33805 33806 2f8301e 33805->33806 33807 2f84239 11 API calls 33806->33807 33808 2f83037 33807->33808 33809 2f84239 11 API calls 33808->33809 33810 2f83050 33809->33810 33811 2f84239 11 API calls 33810->33811 33812 2f83069 33811->33812 33813 2f84239 11 API calls 33812->33813 33814 2f83082 33813->33814 33815 2f84239 11 API calls 33814->33815 33816 2f8309b 33815->33816 33817 2f84239 11 API calls 33816->33817 33818 2f830b4 33817->33818 33819 2f84239 11 API calls 33818->33819 33820 2f830cd 33819->33820 33821 2f84239 11 API calls 33820->33821 33822 2f830e6 33821->33822 33823 2f84239 11 API calls 33822->33823 33824 2f830ff 33823->33824 33825 2f84239 11 API calls 33824->33825 33826 2f83118 33825->33826 33827 2f84239 11 API calls 33826->33827 33828 2f83131 33827->33828 33829 2f84239 11 API calls 33828->33829 33830 2f8314a 33829->33830 33831 2f84239 11 API calls 33830->33831 33832 2f83163 33831->33832 33833 2f84239 11 API calls 33832->33833 33834 2f8317c 33833->33834 33835 2f84239 11 API calls 33834->33835 33836 2f83195 33835->33836 33837 2f84239 11 API calls 33836->33837 33838 2f831ae 33837->33838 33839 2f84239 11 API calls 33838->33839 33840 2f831c7 33839->33840 33841 2f84239 11 API calls 33840->33841 33842 2f831e0 33841->33842 33843 2f84239 11 API calls 33842->33843 33844 2f831f9 33843->33844 33845 2f84239 11 API calls 33844->33845 33846 2f83212 33845->33846 33847 2f84239 11 API calls 33846->33847 33848 2f8322b 33847->33848 33849 2f84239 11 API calls 33848->33849 33850 2f83244 33849->33850 33851 2f84239 11 API calls 33850->33851 33852 2f8325d 33851->33852 33853 2f84239 11 API calls 33852->33853 33854 2f83276 33853->33854 33855 2f84239 11 API calls 33854->33855 33856 2f8328f 33855->33856 33857 2f84239 11 API calls 33856->33857 33858 2f832a8 33857->33858 33859 2f84239 11 API calls 33858->33859 33860 2f832c1 33859->33860 33861 2f84239 11 API calls 33860->33861 33862 2f832da 33861->33862 33863 2f84239 11 API calls 33862->33863 33864 2f832f3 33863->33864 33865 2f84239 11 API calls 33864->33865 33866 2f8330c 33865->33866 33867 2f84239 11 API calls 33866->33867 33868 2f83325 33867->33868 33869 2f84239 11 API calls 33868->33869 33870 2f8333e 33869->33870 33871 2f84239 11 API calls 33870->33871 33872 2f83357 33871->33872 33873 2f84239 11 API calls 33872->33873 33874 2f83370 33873->33874 33875 2f84239 11 API calls 33874->33875 33876 2f83389 33875->33876 33877 2f84239 11 API calls 33876->33877 33878 2f833a2 33877->33878 33879 2f84239 11 API calls 33878->33879 33880 2f833bb 33879->33880 33881 2f84239 11 API calls 33880->33881 33882 2f833d4 33881->33882 33883 2f84239 11 API calls 33882->33883 33884 2f833ed 33883->33884 33885 2f84239 11 API calls 33884->33885 33886 2f83406 33885->33886 33887 2f84239 11 API calls 33886->33887 33888 2f8341f 33887->33888 33889 2f84239 11 API calls 33888->33889 33890 2f83438 33889->33890 33891 2f84239 11 API calls 33890->33891 33892 2f83451 33891->33892 33893 2f84239 11 API calls 33892->33893 33894 2f8346a 33893->33894 33895 2f84239 11 API calls 33894->33895 33896 2f83483 33895->33896 33897 2f84239 11 API calls 33896->33897 33898 2f8349c 33897->33898 33899 2f84239 11 API calls 33898->33899 33900 2f834b5 33899->33900 33901 2f84239 11 API calls 33900->33901 33902 2f834ce 33901->33902 33903 2f84239 11 API calls 33902->33903 33904 2f834e7 33903->33904 33905 2f84239 11 API calls 33904->33905 33906 2f83500 33905->33906 33907 2f84239 11 API calls 33906->33907 33908 2f83519 33907->33908 33909 2f84239 11 API calls 33908->33909 33910 2f83532 33909->33910 33911 2f84239 11 API calls 33910->33911 33912 2f8354b 33911->33912 33913 2f84239 11 API calls 33912->33913 33914 2f83564 33913->33914 33915 2f84239 11 API calls 33914->33915 33916 2f8357d 33915->33916 33917 2f84239 11 API calls 33916->33917 33918 2f83596 33917->33918 33919 2f84239 11 API calls 33918->33919 33920 2f835af 33919->33920 33921 2f84239 11 API calls 33920->33921 33922 2f835c8 33921->33922 33923 2f84239 11 API calls 33922->33923 33924 2f835e1 33923->33924 33925 2f84239 11 API calls 33924->33925 33926 2f835fa 33925->33926 33927 2f84239 11 API calls 33926->33927 33928 2f83613 33927->33928 33929 2f84239 11 API calls 33928->33929 33930 2f8362c 33929->33930 33931 2f84239 11 API calls 33930->33931 33932 2f83645 33931->33932 33933 2f84239 11 API calls 33932->33933 33934 2f8365e 33933->33934 33935 2f84239 11 API calls 33934->33935 33936 2f83677 33935->33936 33937 2f84239 11 API calls 33936->33937 33938 2f83690 33937->33938 33939 2f84239 11 API calls 33938->33939 33940 2f836a9 33939->33940 33941 2f84239 11 API calls 33940->33941 33942 2f836c2 33941->33942 33943 2f84239 11 API calls 33942->33943 33944 2f836db 33943->33944 33945 2f84239 11 API calls 33944->33945 33946 2f836f4 33945->33946 33947 2f84239 11 API calls 33946->33947 33948 2f8370d 33947->33948 33949 2f84239 11 API calls 33948->33949 33950 2f83726 33949->33950 33951 2f84239 11 API calls 33950->33951 33952 2f8373f 33951->33952 33953 2f84239 11 API calls 33952->33953 33954 2f83758 33953->33954 33955 2f84239 11 API calls 33954->33955 33956 2f83771 33955->33956 33957 2f84239 11 API calls 33956->33957 33958 2f8378a 33957->33958 33959 2f84239 11 API calls 33958->33959 33960 2f837a3 33959->33960 33961 2f84239 11 API calls 33960->33961 33962 2f837bc 33961->33962 33963 2f84239 11 API calls 33962->33963 33964 2f837d5 33963->33964 33965 2f84239 11 API calls 33964->33965 33966 2f837ee 33965->33966 33967 2f84239 11 API calls 33966->33967 33968 2f83807 33967->33968 33969 2f84239 11 API calls 33968->33969 33970 2f83820 33969->33970 33971 2f84239 11 API calls 33970->33971 33972 2f83839 33971->33972 33973 2f84239 11 API calls 33972->33973 33974 2f83852 33973->33974 33975 2f84239 11 API calls 33974->33975 33976 2f8386b 33975->33976 33977 2f84239 11 API calls 33976->33977 33978 2f83884 33977->33978 33979 2f84239 11 API calls 33978->33979 33980 2f8389d 33979->33980 33981 2f84239 11 API calls 33980->33981 33982 2f838b6 33981->33982 33983 2f84239 11 API calls 33982->33983 33984 2f838cf 33983->33984 33985 2f84239 11 API calls 33984->33985 33986 2f838e8 33985->33986 33987 2f84239 11 API calls 33986->33987 33988 2f83901 33987->33988 33989 2f84239 11 API calls 33988->33989 33990 2f8391a 33989->33990 33991 2f84239 11 API calls 33990->33991 33992 2f83933 33991->33992 33993 2f84239 11 API calls 33992->33993 33994 2f8394c 33993->33994 33995 2f84239 11 API calls 33994->33995 33996 2f83965 33995->33996 33997 2f84239 11 API calls 33996->33997 33998 2f8397e 33997->33998 33999 2f84239 11 API calls 33998->33999 34000 2f83997 33999->34000 34001 2f84239 11 API calls 34000->34001 34002 2f839b0 34001->34002 34003 2f84239 11 API calls 34002->34003 34004 2f839c9 34003->34004 34005 2f84239 11 API calls 34004->34005 34006 2f839e2 34005->34006 34007 2f84239 11 API calls 34006->34007 34008 2f839fb 34007->34008 34009 2f84239 11 API calls 34008->34009 34010 2f83a14 34009->34010 34011 2f84239 11 API calls 34010->34011 34012 2f83a2d 34011->34012 34013 2f84239 11 API calls 34012->34013 34014 2f83a46 34013->34014 34015 2f84239 11 API calls 34014->34015 34016 2f83a5f 34015->34016 34017 2f84239 11 API calls 34016->34017 34018 2f83a78 34017->34018 34019 2f84239 11 API calls 34018->34019 34020 2f83a91 34019->34020 34021 2f84239 11 API calls 34020->34021 34022 2f83aaa 34021->34022 34023 2f84239 11 API calls 34022->34023 34024 2f83ac3 34023->34024 34025 2f84239 11 API calls 34024->34025 34026 2f83adc 34025->34026 34027 2f84239 11 API calls 34026->34027 34028 2f83af5 34027->34028 34029 2f84239 11 API calls 34028->34029 34030 2f83b0e 34029->34030 34031 2f84239 11 API calls 34030->34031 34032 2f83b27 34031->34032 34033 2f84239 11 API calls 34032->34033 34034 2f83b40 34033->34034 34035 2f84239 11 API calls 34034->34035 34036 2f83b59 34035->34036 34037 2f84239 11 API calls 34036->34037 34038 2f83b72 34037->34038 34039 2f84239 11 API calls 34038->34039 34040 2f83b8b 34039->34040 34041 2f84239 11 API calls 34040->34041 34042 2f83ba4 34041->34042 34043 2f84239 11 API calls 34042->34043 34044 2f83bbd 34043->34044 34045 2f84239 11 API calls 34044->34045 34046 2f83bd6 34045->34046 34047 2f84239 11 API calls 34046->34047 34048 2f83bef 34047->34048 34049 2f84239 11 API calls 34048->34049 34050 2f83c08 34049->34050 34051 2f84239 11 API calls 34050->34051 34052 2f83c21 34051->34052 34053 2f84239 11 API calls 34052->34053 34054 2f83c3a 34053->34054 34055 2f84239 11 API calls 34054->34055 34056 2f83c53 34055->34056 34057 2f84239 11 API calls 34056->34057 34058 2f83c6c 34057->34058 34059 2f84239 11 API calls 34058->34059 34060 2f83c85 34059->34060 34061 2f84239 11 API calls 34060->34061 34062 2f83c9e 34061->34062 34063 2f84239 11 API calls 34062->34063 34064 2f83cb7 34063->34064 34065 2f84239 11 API calls 34064->34065 34066 2f83cd0 34065->34066 34067 2f84239 11 API calls 34066->34067 34068 2f83ce9 34067->34068 34069 2f84239 11 API calls 34068->34069 34070 2f83d02 34069->34070 34071 2f84239 11 API calls 34070->34071 34072 2f83d1b 34071->34072 34073 2f84239 11 API calls 34072->34073 34074 2f83d34 34073->34074 34075 2f84239 11 API calls 34074->34075 34076 2f83d4d 34075->34076 34077 2f84239 11 API calls 34076->34077 34078 2f83d66 34077->34078 34079 2f84239 11 API calls 34078->34079 34080 2f83d7f 34079->34080 34081 2f84239 11 API calls 34080->34081 34082 2f83d98 34081->34082 34083 2f84239 11 API calls 34082->34083 34084 2f83db1 34083->34084 34085 2f84239 11 API calls 34084->34085 34086 2f83dca 34085->34086 34087 2f84239 11 API calls 34086->34087 34088 2f83de3 34087->34088 34089 2f84239 11 API calls 34088->34089 34090 2f83dfc 34089->34090 34091 2f84239 11 API calls 34090->34091 34092 2f83e15 34091->34092 34093 2f84239 11 API calls 34092->34093 34094 2f83e2e 34093->34094 34095 2f84239 11 API calls 34094->34095 34096 2f83e47 34095->34096 34097 2f84239 11 API calls 34096->34097 34098 2f83e60 34097->34098 34099 2f84239 11 API calls 34098->34099 34100 2f83e79 34099->34100 34101 2f84239 11 API calls 34100->34101 34102 2f83e92 34101->34102 34103 2f84239 11 API calls 34102->34103 34104 2f83eab 34103->34104 34105 2f84239 11 API calls 34104->34105 34106 2f83ec4 34105->34106 34107 2f84239 11 API calls 34106->34107 34108 2f83edd 34107->34108 34109 2f84239 11 API calls 34108->34109 34110 2f83ef6 34109->34110 34111 2f84239 11 API calls 34110->34111 34112 2f83f0f 34111->34112 34113 2f84239 11 API calls 34112->34113 34114 2f83f28 34113->34114 34115 2f84239 11 API calls 34114->34115 34116 2f83f41 34115->34116 34117 2f84239 11 API calls 34116->34117 34118 2f83f5a 34117->34118 34119 2f84239 11 API calls 34118->34119 34120 2f83f73 34119->34120 34121 2f84239 11 API calls 34120->34121 34122 2f83f8c 34121->34122 34123 2f84239 11 API calls 34122->34123 34124 2f83fa5 34123->34124 34125 2f84239 11 API calls 34124->34125 34126 2f83fbe 34125->34126 34127 2f84239 11 API calls 34126->34127 34128 2f83fd7 34127->34128 34129 2f84239 11 API calls 34128->34129 34130 2f83ff0 34129->34130 34131 2f84239 11 API calls 34130->34131 34132 2f84009 34131->34132 34133 2f84239 11 API calls 34132->34133 34134 2f84022 34133->34134 34135 2f84239 11 API calls 34134->34135 34136 2f8403b 34135->34136 34137 2f84239 11 API calls 34136->34137 34138 2f84054 34137->34138 34139 2f84239 11 API calls 34138->34139 34140 2f8406d 34139->34140 34141 2f84239 11 API calls 34140->34141 34142 2f84086 34141->34142 34143 2f84239 11 API calls 34142->34143 34144 2f8409f 34143->34144 34145 2f84239 11 API calls 34144->34145 34146 2f840b8 34145->34146 34147 2f84239 11 API calls 34146->34147 34148 2f840d1 34147->34148 34149 2f84239 11 API calls 34148->34149 34150 2f840ea 34149->34150 34151 2f84239 11 API calls 34150->34151 34152 2f84103 34151->34152 34153 2f84239 11 API calls 34152->34153 34154 2f8411c 34153->34154 34155 2f84239 11 API calls 34154->34155 34156 2f84135 34155->34156 34157 2f84239 11 API calls 34156->34157 34158 2f8414e 34157->34158 34159 2f84239 11 API calls 34158->34159 34160 2f84167 34159->34160 34161 2f84239 11 API calls 34160->34161 34162 2f84180 34161->34162 34163 2f84239 11 API calls 34162->34163 34164 2f84199 34163->34164 34165 2f84239 11 API calls 34164->34165 34166 2f841b2 34165->34166 34167 2f84239 11 API calls 34166->34167 34168 2f841cb 34167->34168 34169 2f84239 11 API calls 34168->34169 34170 2f841e4 34169->34170 34171 2f84239 11 API calls 34170->34171 34172 2f841fd 34171->34172 34173 2f84239 11 API calls 34172->34173 34174 2f84216 34173->34174 34175 2f84239 11 API calls 34174->34175 34176 2f8422f 34175->34176 34177 2f9b050 34176->34177 34178 2f9b060 50 API calls 34177->34178 34179 2f9b4d7 9 API calls 34177->34179 34178->34179 34180 2f9b578 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 34179->34180 34181 2f9b5eb 34179->34181 34180->34181 34182 2f9b5f8 8 API calls 34181->34182 34183 2f9b6b0 34181->34183 34182->34183 34184 2f9b6b9 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 34183->34184 34185 2f9b72c 34183->34185 34184->34185 34186 2f9b739 6 API calls 34185->34186 34187 2f9b7c3 34185->34187 34186->34187 34188 2f9b89f 34187->34188 34189 2f9b7d0 9 API calls 34187->34189 34190 2f9b8a8 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 34188->34190 34191 2f9b91b 34188->34191 34189->34188 34190->34191 34192 2f9b952 34191->34192 34193 2f9b924 GetProcAddress GetProcAddress 34191->34193 34194 2f9b989 34192->34194 34195 2f9b95b GetProcAddress GetProcAddress 34192->34195 34193->34192 34196 2f9ba7a 34194->34196 34197 2f9b996 10 API calls 34194->34197 34195->34194 34198 2f9badf 34196->34198 34199 2f9ba83 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 34196->34199 34197->34196 34200 2f9bae8 GetProcAddress 34198->34200 34201 2f9baff 34198->34201 34199->34198 34200->34201 34202 2f9bb08 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 34201->34202 34203 2f9bb64 34201->34203 34202->34203 34204 2f9bb6d GetProcAddress 34203->34204 34205 2f9bb83 34203->34205 34204->34205 34205->33236 34207 2f93940 FindCloseChangeNotification 34206->34207 34208 2f93912 Process32Next 34206->34208 34210 2f9395c 34207->34210 34208->34207 34209 2f93926 StrCmpCA 34208->34209 34211 2f9393a 34209->34211 34210->33433 34212 2fa16c8 34210->34212 34211->34208 35321 2fa14fa 34212->35321 34214 2fa16db 34214->33433 34216 2f91668 lstrcpy 34215->34216 34217 2f92d78 34216->34217 34218 2f91668 lstrcpy 34217->34218 34219 2f92d86 GetSystemTime 34218->34219 34220 2f92d9d 34219->34220 34221 2f916b4 lstrcpy 34220->34221 34222 2f92df5 34221->34222 34222->33239 34225 2f917f1 34223->34225 34224 2f91840 34226 2f916b4 lstrcpy 34224->34226 34225->34224 34227 2f91824 lstrcpy lstrcat 34225->34227 34228 2f9184c 34226->34228 34227->34224 34228->33256 34230 2f916b4 lstrcpy 34229->34230 34231 2f8135e 34230->34231 34232 2f916b4 lstrcpy 34231->34232 34233 2f81370 34232->34233 34234 2f916b4 lstrcpy 34233->34234 34235 2f81382 34234->34235 34236 2f916b4 lstrcpy 34235->34236 34237 2f813ac 34236->34237 34238 2f98167 34237->34238 34239 2f98178 34238->34239 34240 2f91715 2 API calls 34239->34240 34241 2f98185 34240->34241 34242 2f91715 2 API calls 34241->34242 34243 2f98192 34242->34243 34244 2f91715 2 API calls 34243->34244 34245 2f9819f 34244->34245 34246 2f91668 lstrcpy 34245->34246 34247 2f981ac 34246->34247 34248 2f91668 lstrcpy 34247->34248 34249 2f981b9 34248->34249 34250 2f91668 lstrcpy 34249->34250 34251 2f981c6 34250->34251 34252 2f91668 lstrcpy 34251->34252 34253 2f981d3 34252->34253 34254 2f91668 lstrcpy 34253->34254 34255 2f981e0 34254->34255 34256 2f91668 lstrcpy 34255->34256 34312 2f981ed 34256->34312 34257 2f82282 lstrcpy 34257->34312 34258 2f822c1 lstrcpy 34258->34312 34259 2f916b4 lstrcpy 34259->34312 34260 2f9177a lstrcpy 34260->34312 34261 2f982bc StrCmpCA 34261->34312 34262 2f98320 StrCmpCA 34263 2f98469 34262->34263 34262->34312 34264 2f9177a lstrcpy 34263->34264 34265 2f98475 34264->34265 35339 2f822c1 34265->35339 34266 2f8134c lstrcpy 34266->34312 34269 2f9177a lstrcpy 34271 2f9848b 34269->34271 34270 2f98518 StrCmpCA 34273 2f98661 34270->34273 34270->34312 35342 2f8230f lstrcpy 34271->35342 34272 2f82297 lstrcpy 34272->34312 34274 2f9177a lstrcpy 34273->34274 34277 2f9866d 34274->34277 34275 2f822ac lstrcpy 34275->34312 34279 2f822c1 lstrcpy 34277->34279 34278 2f984a2 34280 2f9177a lstrcpy 34278->34280 34281 2f98679 34279->34281 34282 2f984ac 34280->34282 34283 2f9177a lstrcpy 34281->34283 35343 2f98c28 lstrcpy 34282->35343 34285 2f98683 34283->34285 34284 2f98710 StrCmpCA 34286 2f98859 34284->34286 34284->34312 35344 2f8230f lstrcpy 34285->35344 34287 2f9177a lstrcpy 34286->34287 34290 2f98865 34287->34290 35346 2f822d6 lstrcpy 34290->35346 34291 2f822eb lstrcpy 34291->34312 34292 2f9869a 34294 2f9177a lstrcpy 34292->34294 34296 2f986a4 34294->34296 34295 2f98871 34297 2f9177a lstrcpy 34295->34297 35345 2f98c28 lstrcpy 34296->35345 34301 2f9887b 34297->34301 34298 2f9840d StrCmpCA 34298->34312 34299 2f97f35 27 API calls 34299->34312 34300 2f98908 StrCmpCA 34302 2f98a51 34300->34302 34300->34312 35347 2f82324 lstrcpy 34301->35347 34305 2f9177a lstrcpy 34302->34305 34303 2f822d6 lstrcpy 34303->34312 34307 2f98a5d 34305->34307 35349 2f822d6 lstrcpy 34307->35349 34308 2f98892 34310 2f9177a lstrcpy 34308->34310 34313 2f9889c 34310->34313 34311 2f98a69 34314 2f9177a lstrcpy 34311->34314 34312->34257 34312->34258 34312->34259 34312->34260 34312->34261 34312->34262 34312->34266 34312->34270 34312->34272 34312->34275 34312->34284 34312->34291 34312->34298 34312->34299 34312->34300 34312->34303 34315 2f98605 StrCmpCA 34312->34315 34316 2f98b00 StrCmpCA 34312->34316 34330 2f987fd StrCmpCA 34312->34330 34337 2f989f5 StrCmpCA 34312->34337 34338 2f97e48 22 API calls 34312->34338 35348 2f98c28 lstrcpy 34313->35348 34317 2f98a73 34314->34317 34315->34312 34318 2f98b0b Sleep 34316->34318 34319 2f98b20 34316->34319 35350 2f82324 lstrcpy 34317->35350 34318->34312 34321 2f9177a lstrcpy 34319->34321 34322 2f98b2c 34321->34322 35352 2f822d6 lstrcpy 34322->35352 34325 2f98a8a 34327 2f9177a lstrcpy 34325->34327 34326 2f98b38 34328 2f9177a lstrcpy 34326->34328 34329 2f98a94 34327->34329 34331 2f98b42 34328->34331 35351 2f98c28 lstrcpy 34329->35351 34330->34312 35353 2f822d6 lstrcpy 34331->35353 34334 2f98b59 34335 2f9177a lstrcpy 34334->34335 34336 2f98b63 34335->34336 35354 2f98c28 lstrcpy 34336->35354 34337->34312 34338->34312 34339 2f984c3 34339->33271 34342 2f9177a lstrcpy 34341->34342 34343 2f9a4dd 34342->34343 34344 2f9177a lstrcpy 34343->34344 34345 2f9a4ef 34344->34345 34346 2f9177a lstrcpy 34345->34346 34347 2f9a501 34346->34347 34347->33273 34348->33306 34350 2f9196e 34349->34350 34351 2f91975 GetVolumeInformationA 34349->34351 34350->34351 34353 2f919b3 34351->34353 34352 2f91a11 GetProcessHeap RtlAllocateHeap 34354 2f91a2e 34352->34354 34355 2f91a40 wsprintfA lstrcat 34352->34355 34353->34352 34356 2f91668 lstrcpy 34354->34356 35355 2f92667 GetCurrentHwProfileA 34355->35355 34358 2f91a38 34356->34358 34358->33320 34359 2f91a74 34360 2f91a7d lstrlen 34359->34360 34361 2f91a91 34360->34361 35361 2f936ce lstrcpy malloc 34361->35361 34363 2f91a9e 34364 2f91aa8 lstrcat 34363->34364 34365 2f91abd 34364->34365 34366 2f91668 lstrcpy 34365->34366 34367 2f91ad0 34366->34367 34367->34358 34369 2f916b4 lstrcpy 34368->34369 34370 2f84413 34369->34370 35362 2f8430f 34370->35362 34372 2f8441f 34373 2f91668 lstrcpy 34372->34373 34374 2f8444d 34373->34374 34375 2f91668 lstrcpy 34374->34375 34376 2f8445a 34375->34376 34377 2f91668 lstrcpy 34376->34377 34378 2f84467 34377->34378 34379 2f91668 lstrcpy 34378->34379 34380 2f84474 34379->34380 34381 2f91668 lstrcpy 34380->34381 34382 2f84481 34381->34382 34383 2f84491 InternetOpenA StrCmpCA 34382->34383 34384 2f844bc 34383->34384 34385 2f84a55 InternetCloseHandle 34384->34385 34386 2f92d64 3 API calls 34384->34386 34390 2f84a69 ctype 34385->34390 34387 2f844db 34386->34387 34388 2f917e0 3 API calls 34387->34388 34389 2f844ed 34388->34389 34391 2f9177a lstrcpy 34389->34391 34392 2f916b4 lstrcpy 34390->34392 34393 2f844f6 34391->34393 34404 2f84a83 34392->34404 34394 2f9185b 4 API calls 34393->34394 34395 2f84520 34394->34395 34396 2f9177a lstrcpy 34395->34396 34397 2f84529 34396->34397 34398 2f9185b 4 API calls 34397->34398 34399 2f84548 34398->34399 34400 2f9177a lstrcpy 34399->34400 34401 2f84551 34400->34401 34402 2f917e0 3 API calls 34401->34402 34403 2f8456f 34402->34403 34405 2f9177a lstrcpy 34403->34405 34404->33324 34406 2f84578 34405->34406 34407 2f9185b 4 API calls 34406->34407 34408 2f84597 34407->34408 34409 2f9177a lstrcpy 34408->34409 34410 2f845a0 34409->34410 34411 2f9185b 4 API calls 34410->34411 34412 2f845bf 34411->34412 34413 2f9177a lstrcpy 34412->34413 34414 2f845c8 34413->34414 34415 2f9185b 4 API calls 34414->34415 34416 2f845f3 34415->34416 34417 2f917e0 3 API calls 34416->34417 34418 2f845fa 34417->34418 34419 2f9177a lstrcpy 34418->34419 34420 2f84603 34419->34420 34421 2f84619 InternetConnectA 34420->34421 34421->34385 34422 2f84645 HttpOpenRequestA 34421->34422 34424 2f84a49 InternetCloseHandle 34422->34424 34425 2f84695 34422->34425 34424->34385 34426 2f8469b InternetSetOptionA 34425->34426 34427 2f846c0 34425->34427 34426->34427 34428 2f9185b 4 API calls 34427->34428 34429 2f846d4 34428->34429 34430 2f9177a lstrcpy 34429->34430 34431 2f846dd 34430->34431 34432 2f917e0 3 API calls 34431->34432 34433 2f846fb 34432->34433 34434 2f9177a lstrcpy 34433->34434 34435 2f84704 34434->34435 34436 2f9185b 4 API calls 34435->34436 34437 2f84723 34436->34437 34438 2f9177a lstrcpy 34437->34438 34439 2f8472c 34438->34439 34440 2f9185b 4 API calls 34439->34440 34441 2f8474c 34440->34441 34442 2f9177a lstrcpy 34441->34442 34443 2f84755 34442->34443 34444 2f9185b 4 API calls 34443->34444 34445 2f84774 34444->34445 34446 2f9177a lstrcpy 34445->34446 34447 2f8477d 34446->34447 34448 2f9185b 4 API calls 34447->34448 34449 2f8479c 34448->34449 34450 2f9177a lstrcpy 34449->34450 34451 2f847a5 34450->34451 34452 2f917e0 3 API calls 34451->34452 34453 2f847c3 34452->34453 34454 2f9177a lstrcpy 34453->34454 34455 2f847cc 34454->34455 34456 2f9185b 4 API calls 34455->34456 34457 2f847eb 34456->34457 34458 2f9177a lstrcpy 34457->34458 34459 2f847f4 34458->34459 34460 2f9185b 4 API calls 34459->34460 34461 2f84813 34460->34461 34462 2f9177a lstrcpy 34461->34462 34463 2f8481c 34462->34463 34464 2f917e0 3 API calls 34463->34464 34465 2f8483a 34464->34465 34466 2f9177a lstrcpy 34465->34466 34467 2f84843 34466->34467 34468 2f9185b 4 API calls 34467->34468 34469 2f84862 34468->34469 34470 2f9177a lstrcpy 34469->34470 34471 2f8486b 34470->34471 34472 2f9185b 4 API calls 34471->34472 34473 2f8488b 34472->34473 34474 2f9177a lstrcpy 34473->34474 34475 2f84894 34474->34475 34476 2f9185b 4 API calls 34475->34476 34477 2f848b3 34476->34477 34478 2f9177a lstrcpy 34477->34478 34479 2f848bc 34478->34479 34480 2f9185b 4 API calls 34479->34480 34481 2f848db 34480->34481 34482 2f9177a lstrcpy 34481->34482 34483 2f848e4 34482->34483 34484 2f917e0 3 API calls 34483->34484 34485 2f84902 34484->34485 34486 2f9177a lstrcpy 34485->34486 34487 2f8490b 34486->34487 34488 2f91668 lstrcpy 34487->34488 34489 2f84926 34488->34489 34490 2f917e0 3 API calls 34489->34490 34491 2f84947 34490->34491 34492 2f917e0 3 API calls 34491->34492 34493 2f8494e 34492->34493 34494 2f9177a lstrcpy 34493->34494 34495 2f8495a 34494->34495 34496 2f8497b lstrlen 34495->34496 34497 2f8498e 34496->34497 34498 2f84997 lstrlen 34497->34498 35370 2f9193a 34498->35370 34500 2f849a7 HttpSendRequestA 34501 2f849bf InternetReadFile 34500->34501 34502 2f849f3 InternetCloseHandle 34501->34502 34507 2f849ea 34501->34507 35371 2f91701 34502->35371 34505 2f9185b 4 API calls 34505->34507 34506 2f9177a lstrcpy 34506->34507 34507->34501 34507->34502 34507->34505 34507->34506 35375 2f9193a 34508->35375 34510 2f94fb0 StrCmpCA 34511 2f94fbb ExitProcess 34510->34511 34512 2f94fc3 34510->34512 34513 2f94fd3 strtok_s 34512->34513 34526 2f94fdf 34513->34526 34514 2f951a9 34514->33327 34515 2f95188 strtok_s 34515->34526 34516 2f9502b StrCmpCA 34516->34526 34517 2f9512b StrCmpCA 34517->34526 34518 2f9500a StrCmpCA 34518->34526 34519 2f9506d StrCmpCA 34519->34526 34520 2f9504c StrCmpCA 34520->34526 34521 2f950a1 StrCmpCA 34521->34526 34522 2f950e3 StrCmpCA 34522->34526 34523 2f95163 StrCmpCA 34523->34526 34524 2f950c2 StrCmpCA 34524->34526 34525 2f95104 StrCmpCA 34525->34526 34526->34514 34526->34515 34526->34516 34526->34517 34526->34518 34526->34519 34526->34520 34526->34521 34526->34522 34526->34523 34526->34524 34526->34525 34527 2f91715 2 API calls 34526->34527 34527->34526 34529 2f916b4 lstrcpy 34528->34529 34530 2f858dd 34529->34530 34531 2f8430f 4 API calls 34530->34531 34532 2f858e9 34531->34532 34533 2f91668 lstrcpy 34532->34533 34534 2f8591a 34533->34534 34535 2f91668 lstrcpy 34534->34535 34536 2f85927 34535->34536 34537 2f91668 lstrcpy 34536->34537 34538 2f85934 34537->34538 34539 2f91668 lstrcpy 34538->34539 34540 2f85941 34539->34540 34541 2f91668 lstrcpy 34540->34541 34542 2f8594e 34541->34542 34543 2f8595e InternetOpenA StrCmpCA 34542->34543 34544 2f8597f 34543->34544 34545 2f86073 InternetCloseHandle 34544->34545 34546 2f92d64 3 API calls 34544->34546 34547 2f8608f 34545->34547 34548 2f8599e 34546->34548 35382 2f87dc2 CryptStringToBinaryA 34547->35382 34550 2f917e0 3 API calls 34548->34550 34552 2f859b0 34550->34552 34553 2f9177a lstrcpy 34552->34553 34558 2f859b9 34553->34558 34554 2f91715 2 API calls 34555 2f860ac 34554->34555 34556 2f9185b 4 API calls 34555->34556 34559 2f860c1 34556->34559 34557 2f860cd ctype 34561 2f916b4 lstrcpy 34557->34561 34562 2f9185b 4 API calls 34558->34562 34560 2f9177a lstrcpy 34559->34560 34560->34557 34571 2f860fd 34561->34571 34563 2f859e3 34562->34563 34564 2f9177a lstrcpy 34563->34564 34565 2f859ec 34564->34565 34566 2f9185b 4 API calls 34565->34566 34567 2f85a0b 34566->34567 34568 2f9177a lstrcpy 34567->34568 34569 2f85a14 34568->34569 34570 2f917e0 3 API calls 34569->34570 34572 2f85a32 34570->34572 34571->33339 34573 2f9177a lstrcpy 34572->34573 34574 2f85a3b 34573->34574 34575 2f9185b 4 API calls 34574->34575 34576 2f85a5a 34575->34576 34577 2f9177a lstrcpy 34576->34577 34578 2f85a63 34577->34578 34579 2f9185b 4 API calls 34578->34579 34580 2f85a82 34579->34580 34581 2f9177a lstrcpy 34580->34581 34582 2f85a8b 34581->34582 34583 2f9185b 4 API calls 34582->34583 34584 2f85ab6 34583->34584 34585 2f917e0 3 API calls 34584->34585 34586 2f85abd 34585->34586 34587 2f9177a lstrcpy 34586->34587 34588 2f85ac6 34587->34588 34589 2f85adc InternetConnectA 34588->34589 34589->34545 34590 2f85b08 HttpOpenRequestA 34589->34590 34592 2f85b5f 34590->34592 34593 2f86067 InternetCloseHandle 34590->34593 34594 2f85b8a 34592->34594 34595 2f85b65 InternetSetOptionA 34592->34595 34593->34545 34596 2f9185b 4 API calls 34594->34596 34595->34594 34597 2f85b9e 34596->34597 34598 2f9177a lstrcpy 34597->34598 34599 2f85ba7 34598->34599 34600 2f917e0 3 API calls 34599->34600 34601 2f85bc5 34600->34601 34602 2f9177a lstrcpy 34601->34602 34603 2f85bce 34602->34603 34604 2f9185b 4 API calls 34603->34604 34605 2f85bed 34604->34605 34606 2f9177a lstrcpy 34605->34606 34607 2f85bf6 34606->34607 34608 2f9185b 4 API calls 34607->34608 34609 2f85c16 34608->34609 34610 2f9177a lstrcpy 34609->34610 34611 2f85c1f 34610->34611 34612 2f9185b 4 API calls 34611->34612 34613 2f85c3f 34612->34613 34614 2f9177a lstrcpy 34613->34614 34615 2f85c48 34614->34615 34616 2f9185b 4 API calls 34615->34616 34617 2f85c67 34616->34617 34618 2f9177a lstrcpy 34617->34618 34619 2f85c70 34618->34619 34620 2f917e0 3 API calls 34619->34620 34621 2f85c8e 34620->34621 34622 2f9177a lstrcpy 34621->34622 34623 2f85c97 34622->34623 34624 2f9185b 4 API calls 34623->34624 34625 2f85cb6 34624->34625 34626 2f9177a lstrcpy 34625->34626 34627 2f85cbf 34626->34627 34628 2f9185b 4 API calls 34627->34628 34629 2f85cde 34628->34629 34630 2f9177a lstrcpy 34629->34630 34631 2f85ce7 34630->34631 34632 2f917e0 3 API calls 34631->34632 34633 2f85d05 34632->34633 34634 2f9177a lstrcpy 34633->34634 34635 2f85d0e 34634->34635 34636 2f9185b 4 API calls 34635->34636 34637 2f85d2d 34636->34637 34638 2f9177a lstrcpy 34637->34638 34639 2f85d36 34638->34639 34640 2f9185b 4 API calls 34639->34640 34641 2f85d56 34640->34641 34642 2f9177a lstrcpy 34641->34642 34643 2f85d5f 34642->34643 34644 2f9185b 4 API calls 34643->34644 34645 2f85d7e 34644->34645 34646 2f9177a lstrcpy 34645->34646 34647 2f85d87 34646->34647 34648 2f9185b 4 API calls 34647->34648 34649 2f85da6 34648->34649 34650 2f9177a lstrcpy 34649->34650 34651 2f85daf 34650->34651 34652 2f9185b 4 API calls 34651->34652 34653 2f85dcf 34652->34653 34654 2f9177a lstrcpy 34653->34654 34655 2f85dd8 34654->34655 34656 2f9185b 4 API calls 34655->34656 34657 2f85df7 34656->34657 34658 2f9177a lstrcpy 34657->34658 34659 2f85e00 34658->34659 34660 2f9185b 4 API calls 34659->34660 34661 2f85e1f 34660->34661 34662 2f9177a lstrcpy 34661->34662 34663 2f85e28 34662->34663 34664 2f917e0 3 API calls 34663->34664 34665 2f85e46 34664->34665 34666 2f9177a lstrcpy 34665->34666 34667 2f85e4f 34666->34667 34668 2f9185b 4 API calls 34667->34668 34669 2f85e6e 34668->34669 34670 2f9177a lstrcpy 34669->34670 34671 2f85e77 34670->34671 34672 2f9185b 4 API calls 34671->34672 34673 2f85e97 34672->34673 34674 2f9177a lstrcpy 34673->34674 34675 2f85ea0 34674->34675 34676 2f9185b 4 API calls 34675->34676 34677 2f85ebf 34676->34677 34678 2f9177a lstrcpy 34677->34678 34679 2f85ec8 34678->34679 34680 2f9185b 4 API calls 34679->34680 34681 2f85ee7 34680->34681 34682 2f9177a lstrcpy 34681->34682 34683 2f85ef0 34682->34683 34684 2f917e0 3 API calls 34683->34684 34685 2f85f0e 34684->34685 34686 2f9177a lstrcpy 34685->34686 34687 2f85f17 34686->34687 34688 2f85f2a lstrlen 34687->34688 35376 2f9193a 34688->35376 34690 2f85f3b lstrlen GetProcessHeap RtlAllocateHeap 35377 2f9193a 34690->35377 34692 2f85f67 lstrlen 35378 2f9193a 34692->35378 34694 2f85f77 memcpy 35379 2f9193a 34694->35379 34696 2f85f8e lstrlen 34697 2f85f9e 34696->34697 34698 2f85fa7 lstrlen memcpy 34697->34698 35380 2f9193a 34698->35380 34700 2f85fce lstrlen 35381 2f9193a 34700->35381 34702 2f85fde HttpSendRequestA 34703 2f85fe8 InternetReadFile 34702->34703 34704 2f8601c InternetCloseHandle 34703->34704 34708 2f86013 34703->34708 34704->34593 34706 2f9185b 4 API calls 34706->34708 34707 2f9177a lstrcpy 34707->34708 34708->34703 34708->34704 34708->34706 34708->34707 35387 2f9193a 34709->35387 34711 2f948c7 strtok_s 34714 2f948d3 34711->34714 34712 2f94971 34712->33342 34713 2f91715 lstrlen lstrcpy 34713->34714 34714->34712 34714->34713 34715 2f94950 strtok_s 34714->34715 34715->34714 35388 2f9193a 34716->35388 34718 2f94600 strtok_s 34722 2f9460c 34718->34722 34719 2f9479a 34719->33354 34720 2f91715 lstrlen lstrcpy 34720->34722 34721 2f94669 StrCmpCA 34721->34722 34722->34719 34722->34720 34722->34721 34723 2f94779 strtok_s 34722->34723 34724 2f946c1 StrCmpCA 34722->34724 34725 2f946fa StrCmpCA 34722->34725 34726 2f94733 StrCmpCA 34722->34726 34723->34722 34724->34722 34725->34722 34726->34722 35389 2f9193a 34727->35389 34729 2f947cb strtok_s 34734 2f947d7 34729->34734 34730 2f94896 34730->33369 34731 2f94811 StrCmpCA 34731->34734 34732 2f91715 lstrlen lstrcpy 34732->34734 34733 2f94875 strtok_s 34733->34734 34734->34730 34734->34731 34734->34732 34734->34733 34736 2f91668 lstrcpy 34735->34736 34737 2f951fa 34736->34737 34738 2f9185b 4 API calls 34737->34738 34739 2f9520b 34738->34739 34740 2f9177a lstrcpy 34739->34740 34741 2f95214 34740->34741 34742 2f9185b 4 API calls 34741->34742 34743 2f9522e 34742->34743 34744 2f9177a lstrcpy 34743->34744 34745 2f95237 34744->34745 34746 2f9185b 4 API calls 34745->34746 34747 2f95250 34746->34747 34748 2f9177a lstrcpy 34747->34748 34749 2f95259 34748->34749 34750 2f9185b 4 API calls 34749->34750 34751 2f95272 34750->34751 34752 2f9177a lstrcpy 34751->34752 34753 2f9527b 34752->34753 34754 2f9185b 4 API calls 34753->34754 34755 2f95294 34754->34755 34756 2f9177a lstrcpy 34755->34756 34757 2f9529d 34756->34757 35390 2f91c63 GetProcessHeap RtlAllocateHeap GetLocalTime wsprintfA 34757->35390 34759 2f952aa 34760 2f9185b 4 API calls 34759->34760 34761 2f952b7 34760->34761 34762 2f9177a lstrcpy 34761->34762 34763 2f952c0 34762->34763 34764 2f9185b 4 API calls 34763->34764 34765 2f952d9 34764->34765 34766 2f9177a lstrcpy 34765->34766 34767 2f952e2 34766->34767 34768 2f9185b 4 API calls 34767->34768 34769 2f952fb 34768->34769 34770 2f9177a lstrcpy 34769->34770 34771 2f95304 34770->34771 35391 2f925ca memset RegOpenKeyExA 34771->35391 34773 2f95311 34774 2f9185b 4 API calls 34773->34774 34775 2f9531e 34774->34775 34776 2f9177a lstrcpy 34775->34776 34777 2f95327 34776->34777 34778 2f9185b 4 API calls 34777->34778 34779 2f95343 34778->34779 34780 2f9177a lstrcpy 34779->34780 34781 2f9534c 34780->34781 34782 2f9185b 4 API calls 34781->34782 34783 2f9536b 34782->34783 34784 2f9177a lstrcpy 34783->34784 34785 2f95374 34784->34785 34786 2f92667 2 API calls 34785->34786 34787 2f9538b 34786->34787 34788 2f917e0 3 API calls 34787->34788 34789 2f9539c 34788->34789 34790 2f9177a lstrcpy 34789->34790 34791 2f953a5 34790->34791 34792 2f9185b 4 API calls 34791->34792 34793 2f953cf 34792->34793 34794 2f9177a lstrcpy 34793->34794 34795 2f953d8 34794->34795 34796 2f9185b 4 API calls 34795->34796 34797 2f953f7 34796->34797 34798 2f9177a lstrcpy 34797->34798 34799 2f95400 34798->34799 34800 2f91948 11 API calls 34799->34800 34801 2f95417 34800->34801 34802 2f917e0 3 API calls 34801->34802 34803 2f95428 34802->34803 34804 2f9177a lstrcpy 34803->34804 34805 2f95431 34804->34805 34806 2f9185b 4 API calls 34805->34806 34807 2f9545b 34806->34807 34808 2f9177a lstrcpy 34807->34808 34809 2f95464 34808->34809 34810 2f9185b 4 API calls 34809->34810 34811 2f95483 34810->34811 34812 2f9177a lstrcpy 34811->34812 34813 2f9548c 34812->34813 34814 2f95497 GetCurrentProcessId 34813->34814 35394 2f93563 OpenProcess 34814->35394 34817 2f917e0 3 API calls 34818 2f954bc 34817->34818 34819 2f9177a lstrcpy 34818->34819 34820 2f954c5 34819->34820 34821 2f9185b 4 API calls 34820->34821 34822 2f954ef 34821->34822 34823 2f9177a lstrcpy 34822->34823 34824 2f954f8 34823->34824 34825 2f9185b 4 API calls 34824->34825 34826 2f95517 34825->34826 34827 2f9177a lstrcpy 34826->34827 34828 2f95520 34827->34828 34829 2f9185b 4 API calls 34828->34829 34830 2f9553f 34829->34830 34831 2f9177a lstrcpy 34830->34831 34832 2f95548 34831->34832 34833 2f9185b 4 API calls 34832->34833 34834 2f95567 34833->34834 34835 2f9177a lstrcpy 34834->34835 34836 2f95570 34835->34836 35399 2f91add GetProcessHeap RtlAllocateHeap 34836->35399 34839 2f9185b 4 API calls 34840 2f95590 34839->34840 34841 2f9177a lstrcpy 34840->34841 34842 2f95599 34841->34842 34843 2f9185b 4 API calls 34842->34843 34844 2f955b8 34843->34844 34845 2f9177a lstrcpy 34844->34845 34846 2f955c1 34845->34846 34847 2f9185b 4 API calls 34846->34847 34848 2f955e0 34847->34848 34849 2f9177a lstrcpy 34848->34849 34850 2f955e9 34849->34850 35406 2f927af 34850->35406 34853 2f917e0 3 API calls 34854 2f95611 34853->34854 34855 2f9177a lstrcpy 34854->34855 34856 2f9561a 34855->34856 34857 2f9185b 4 API calls 34856->34857 34858 2f95644 34857->34858 34859 2f9177a lstrcpy 34858->34859 34860 2f9564d 34859->34860 34861 2f9185b 4 API calls 34860->34861 34862 2f9566c 34861->34862 34863 2f9177a lstrcpy 34862->34863 34864 2f95675 34863->34864 35423 2f929bf 34864->35423 34867 2f917e0 3 API calls 34868 2f9569d 34867->34868 34869 2f9177a lstrcpy 34868->34869 34870 2f956a6 34869->34870 34871 2f9185b 4 API calls 34870->34871 34872 2f956d0 34871->34872 34873 2f9177a lstrcpy 34872->34873 34874 2f956d9 34873->34874 34875 2f9185b 4 API calls 34874->34875 34876 2f956f8 34875->34876 34877 2f9177a lstrcpy 34876->34877 34878 2f95701 34877->34878 35440 2f91c21 GetProcessHeap RtlAllocateHeap GetComputerNameA 34878->35440 34881 2f9185b 4 API calls 34882 2f95721 34881->34882 34883 2f9177a lstrcpy 34882->34883 34884 2f9572a 34883->34884 34885 2f9185b 4 API calls 34884->34885 34886 2f95749 34885->34886 34887 2f9177a lstrcpy 34886->34887 34888 2f95752 34887->34888 34889 2f9185b 4 API calls 34888->34889 34890 2f95771 34889->34890 34891 2f9177a lstrcpy 34890->34891 34892 2f9577a 34891->34892 35442 2f91bec GetProcessHeap RtlAllocateHeap GetUserNameA 34892->35442 34894 2f9578a 34895 2f9185b 4 API calls 34894->34895 34896 2f9579a 34895->34896 34897 2f9177a lstrcpy 34896->34897 34898 2f957a3 34897->34898 34899 2f9185b 4 API calls 34898->34899 34900 2f957c2 34899->34900 34901 2f9177a lstrcpy 34900->34901 34902 2f957cb 34901->34902 34903 2f9185b 4 API calls 34902->34903 34904 2f957ea 34903->34904 34905 2f9177a lstrcpy 34904->34905 34906 2f957f3 34905->34906 35443 2f9254a 7 API calls 34906->35443 34909 2f917e0 3 API calls 34910 2f9581b 34909->34910 34911 2f9177a lstrcpy 34910->34911 34912 2f95824 34911->34912 34913 2f9185b 4 API calls 34912->34913 34914 2f9584e 34913->34914 34915 2f9177a lstrcpy 34914->34915 34916 2f95857 34915->34916 34917 2f9185b 4 API calls 34916->34917 34918 2f95876 34917->34918 34919 2f9177a lstrcpy 34918->34919 34920 2f9587f 34919->34920 35446 2f91d31 34920->35446 34922 2f95896 34923 2f917e0 3 API calls 34922->34923 34924 2f958a7 34923->34924 34925 2f9177a lstrcpy 34924->34925 34926 2f958b0 34925->34926 34927 2f9185b 4 API calls 34926->34927 34928 2f958da 34927->34928 34929 2f9177a lstrcpy 34928->34929 34930 2f958e3 34929->34930 34931 2f9185b 4 API calls 34930->34931 34932 2f95902 34931->34932 34933 2f9177a lstrcpy 34932->34933 34934 2f9590b 34933->34934 35458 2f91c63 GetProcessHeap RtlAllocateHeap GetLocalTime wsprintfA 34934->35458 34936 2f9591b 34937 2f9185b 4 API calls 34936->34937 34938 2f9592b 34937->34938 34939 2f9177a lstrcpy 34938->34939 34940 2f95934 34939->34940 34941 2f9185b 4 API calls 34940->34941 34942 2f95953 34941->34942 34943 2f9177a lstrcpy 34942->34943 34944 2f9595c 34943->34944 34945 2f9185b 4 API calls 34944->34945 34946 2f9597b 34945->34946 34947 2f9177a lstrcpy 34946->34947 34948 2f95984 34947->34948 35459 2f91cbf GetProcessHeap RtlAllocateHeap GetTimeZoneInformation 34948->35459 34951 2f9185b 4 API calls 34952 2f959a4 34951->34952 34953 2f9177a lstrcpy 34952->34953 34954 2f959ad 34953->34954 34955 2f9185b 4 API calls 34954->34955 34956 2f959cc 34955->34956 34957 2f9177a lstrcpy 34956->34957 34958 2f959d5 34957->34958 34959 2f9185b 4 API calls 34958->34959 34960 2f959f4 34959->34960 34961 2f9177a lstrcpy 34960->34961 34962 2f959fd 34961->34962 34963 2f9185b 4 API calls 34962->34963 34964 2f95a1c 34963->34964 34965 2f9177a lstrcpy 34964->34965 34966 2f95a25 34965->34966 35462 2f91eb5 GetProcessHeap RtlAllocateHeap RegOpenKeyExA 34966->35462 34968 2f95a35 34969 2f9185b 4 API calls 34968->34969 34970 2f95a45 34969->34970 34971 2f9177a lstrcpy 34970->34971 34972 2f95a4e 34971->34972 34973 2f9185b 4 API calls 34972->34973 34974 2f95a6d 34973->34974 34975 2f9177a lstrcpy 34974->34975 34976 2f95a76 34975->34976 34977 2f9185b 4 API calls 34976->34977 34978 2f95a95 34977->34978 34979 2f9177a lstrcpy 34978->34979 34980 2f95a9e 34979->34980 35465 2f91f54 34980->35465 34983 2f9185b 4 API calls 34984 2f95abe 34983->34984 34985 2f9177a lstrcpy 34984->34985 34986 2f95ac7 34985->34986 34987 2f9185b 4 API calls 34986->34987 34988 2f95ae6 34987->34988 34989 2f9177a lstrcpy 34988->34989 34990 2f95aef 34989->34990 34991 2f9185b 4 API calls 34990->34991 34992 2f95b0e 34991->34992 34993 2f9177a lstrcpy 34992->34993 34994 2f95b17 34993->34994 35478 2f91f21 GetSystemInfo wsprintfA 34994->35478 34996 2f95b27 34997 2f9185b 4 API calls 34996->34997 34998 2f95b37 34997->34998 34999 2f9177a lstrcpy 34998->34999 35000 2f95b40 34999->35000 35001 2f9185b 4 API calls 35000->35001 35002 2f95b5f 35001->35002 35003 2f9177a lstrcpy 35002->35003 35004 2f95b68 35003->35004 35005 2f9185b 4 API calls 35004->35005 35006 2f95b87 35005->35006 35007 2f9177a lstrcpy 35006->35007 35008 2f95b90 35007->35008 35479 2f92081 GetProcessHeap RtlAllocateHeap 35008->35479 35010 2f95ba0 35011 2f9185b 4 API calls 35010->35011 35012 2f95bb0 35011->35012 35013 2f9177a lstrcpy 35012->35013 35014 2f95bb9 35013->35014 35015 2f9185b 4 API calls 35014->35015 35016 2f95bd8 35015->35016 35017 2f9177a lstrcpy 35016->35017 35018 2f95be1 35017->35018 35019 2f9185b 4 API calls 35018->35019 35020 2f95c00 35019->35020 35021 2f9177a lstrcpy 35020->35021 35022 2f95c09 35021->35022 35484 2f9210d 35022->35484 35024 2f95c20 35025 2f917e0 3 API calls 35024->35025 35026 2f95c31 35025->35026 35027 2f9177a lstrcpy 35026->35027 35028 2f95c3a 35027->35028 35029 2f9185b 4 API calls 35028->35029 35030 2f95c64 35029->35030 35031 2f9177a lstrcpy 35030->35031 35032 2f95c6d 35031->35032 35033 2f9185b 4 API calls 35032->35033 35034 2f95c8c 35033->35034 35035 2f9177a lstrcpy 35034->35035 35036 2f95c95 35035->35036 35492 2f9246a 35036->35492 35038 2f95cac 35039 2f917e0 3 API calls 35038->35039 35040 2f95cbd 35039->35040 35041 2f9177a lstrcpy 35040->35041 35042 2f95cc6 35041->35042 35043 2f9185b 4 API calls 35042->35043 35044 2f95cf0 35043->35044 35045 2f9177a lstrcpy 35044->35045 35046 2f95cf9 35045->35046 35047 2f9185b 4 API calls 35046->35047 35048 2f95d18 35047->35048 35049 2f9177a lstrcpy 35048->35049 35050 2f95d21 35049->35050 35502 2f9218b 35050->35502 35052 2f95d3d 35053 2f917e0 3 API calls 35052->35053 35054 2f95d4f 35053->35054 35055 2f9177a lstrcpy 35054->35055 35056 2f95d58 35055->35056 35057 2f9218b 17 API calls 35056->35057 35058 2f95d7f 35057->35058 35059 2f917e0 3 API calls 35058->35059 35060 2f95d91 35059->35060 35061 2f9177a lstrcpy 35060->35061 35062 2f95d9a 35061->35062 35063 2f9185b 4 API calls 35062->35063 35064 2f95dc4 35063->35064 35065 2f9177a lstrcpy 35064->35065 35066 2f95dcd 35065->35066 35067 2f95de0 lstrlen 35066->35067 35068 2f95df0 35067->35068 35069 2f91668 lstrcpy 35068->35069 35070 2f95e00 35069->35070 35071 2f8134c lstrcpy 35070->35071 35072 2f95e0e 35071->35072 35538 2f98db9 35072->35538 35322 2fa150a _MSFOpenExW 35321->35322 35323 2fa151f 35322->35323 35338 2fa15b0 lstrlen lstrcpy _MSFOpenExW 35322->35338 35327 2f9fd2c 35323->35327 35326 2fa153f _MSFOpenExW ctype 35326->34214 35328 2f9fd3e 35327->35328 35335 2f9fd6d 35327->35335 35329 2f9fd7d SetFilePointer 35328->35329 35330 2f9fde0 35328->35330 35328->35335 35333 2f9fdc2 35329->35333 35331 2f9fe48 35330->35331 35332 2f9fde6 CreateFileA 35330->35332 35334 2f9fe79 CreateFileMappingA 35331->35334 35331->35335 35332->35333 35333->35335 35334->35335 35336 2f9fea2 MapViewOfFile 35334->35336 35335->35326 35336->35335 35337 2f9fec9 CloseHandle 35336->35337 35337->35335 35338->35323 35340 2f91668 lstrcpy 35339->35340 35341 2f822d1 35340->35341 35341->34269 35342->34278 35343->34339 35344->34292 35345->34339 35346->34295 35347->34308 35348->34339 35349->34311 35350->34325 35351->34339 35352->34326 35353->34334 35354->34339 35356 2f9267e 35355->35356 35357 2f92691 35355->35357 35358 2f91668 lstrcpy 35356->35358 35359 2f91668 lstrcpy 35357->35359 35360 2f9268a 35358->35360 35359->35360 35360->34359 35361->34363 35363 2f8432d 35362->35363 35364 2f84378 ??_U@YAPAXI ??_U@YAPAXI 35363->35364 35373 2f9193a 35364->35373 35366 2f843b8 lstrlen 35374 2f9193a 35366->35374 35368 2f843c8 InternetCrackUrlA 35369 2f843e5 35368->35369 35369->34372 35370->34500 35372 2f91712 35371->35372 35372->34424 35373->35366 35374->35368 35375->34510 35376->34690 35377->34692 35378->34694 35379->34696 35380->34700 35381->34702 35383 2f86095 35382->35383 35384 2f87df0 LocalAlloc 35382->35384 35383->34554 35383->34557 35384->35383 35385 2f87e0a CryptStringToBinaryA 35384->35385 35385->35383 35386 2f87e2c LocalFree 35385->35386 35386->35383 35387->34711 35388->34718 35389->34729 35390->34759 35392 2f9261c RegQueryValueExA 35391->35392 35393 2f9263f RegCloseKey CharToOemA 35391->35393 35392->35393 35393->34773 35395 2f935a5 35394->35395 35396 2f93585 K32GetModuleFileNameExA CloseHandle 35394->35396 35397 2f91668 lstrcpy 35395->35397 35396->35395 35398 2f935b4 35397->35398 35398->34817 35557 2f91bd2 35399->35557 35402 2f91b0a 35402->34839 35403 2f91b13 RegOpenKeyExA 35404 2f91b4d RegCloseKey 35403->35404 35405 2f91b33 RegQueryValueExA 35403->35405 35404->35402 35405->35404 35407 2f927df 35406->35407 35408 2f9297e 35407->35408 35409 2f92844 35407->35409 35410 2f91668 lstrcpy 35408->35410 35413 2f9296a 35409->35413 35416 2f92889 35409->35416 35415 2f928b8 35410->35415 35411 2f929ad 35411->34853 35412 2f91668 lstrcpy 35412->35411 35414 2f91668 lstrcpy 35413->35414 35414->35415 35415->35411 35415->35412 35416->35415 35417 2f928bd VariantInit 35416->35417 35418 2f928e1 35417->35418 35564 2f926a3 35418->35564 35421 2f91668 lstrcpy 35422 2f92951 VariantClear 35421->35422 35422->35411 35422->35415 35424 2f929ef 35423->35424 35425 2f92b22 35424->35425 35426 2f92a54 35424->35426 35427 2f91668 lstrcpy 35425->35427 35431 2f92b0e 35426->35431 35433 2f92a95 35426->35433 35428 2f92ac0 35427->35428 35429 2f92b51 35428->35429 35430 2f91668 lstrcpy 35428->35430 35429->34867 35430->35429 35432 2f91668 lstrcpy 35431->35432 35432->35428 35433->35428 35434 2f92ac2 VariantInit 35433->35434 35435 2f92ae6 35434->35435 35571 2f92ef6 LocalAlloc CharToOemW 35435->35571 35437 2f92aee 35438 2f91668 lstrcpy 35437->35438 35439 2f92af8 VariantClear 35438->35439 35439->35428 35439->35429 35441 2f91c55 35440->35441 35441->34881 35442->34894 35444 2f91668 lstrcpy 35443->35444 35445 2f925c5 35444->35445 35445->34909 35447 2f91668 lstrcpy 35446->35447 35448 2f91d4a GetKeyboardLayoutList LocalAlloc GetKeyboardLayoutList 35447->35448 35457 2f91d98 35448->35457 35449 2f91e87 35451 2f91e8d LocalFree 35449->35451 35452 2f91e96 35449->35452 35450 2f91db7 GetLocaleInfoA 35450->35457 35451->35452 35453 2f916b4 lstrcpy 35452->35453 35455 2f91ea5 35453->35455 35454 2f9185b lstrcpy lstrlen lstrcpy lstrcat 35454->35457 35455->34922 35456 2f9177a lstrcpy 35456->35457 35457->35449 35457->35450 35457->35454 35457->35456 35458->34936 35460 2f91cfe 35459->35460 35461 2f91d06 wsprintfA 35459->35461 35460->34951 35461->35460 35463 2f91ef9 RegQueryValueExA 35462->35463 35464 2f91f13 RegCloseKey 35462->35464 35463->35464 35464->34968 35466 2f91f78 GetLogicalProcessorInformationEx 35465->35466 35467 2f91f96 GetLastError 35466->35467 35469 2f91fe6 35466->35469 35468 2f91fda 35467->35468 35477 2f91fa1 35467->35477 35472 2f91fce 35468->35472 35575 2f92c28 GetProcessHeap HeapFree 35468->35575 35574 2f92c28 GetProcessHeap HeapFree 35469->35574 35472->34983 35475 2f92035 35475->35468 35476 2f9203c wsprintfA 35475->35476 35476->35472 35477->35466 35477->35472 35572 2f92c28 GetProcessHeap HeapFree 35477->35572 35573 2f92c45 GetProcessHeap RtlAllocateHeap 35477->35573 35478->34996 35576 2f92bde 35479->35576 35482 2f920c1 __aulldiv 35483 2f920f1 wsprintfA 35482->35483 35483->35010 35485 2f91668 lstrcpy 35484->35485 35486 2f92123 35485->35486 35487 2f92130 EnumDisplayDevicesA 35486->35487 35488 2f91715 2 API calls 35486->35488 35490 2f92157 35486->35490 35487->35486 35487->35490 35488->35486 35489 2f916b4 lstrcpy 35491 2f9217e 35489->35491 35490->35489 35491->35024 35493 2f91668 lstrcpy 35492->35493 35494 2f92483 CreateToolhelp32Snapshot Process32First 35493->35494 35495 2f924ae Process32Next 35494->35495 35496 2f92522 CloseHandle 35494->35496 35495->35496 35500 2f924c2 35495->35500 35497 2f916b4 lstrcpy 35496->35497 35498 2f9253a 35497->35498 35498->35038 35499 2f9185b lstrcpy lstrlen lstrcpy lstrcat 35499->35500 35500->35495 35500->35499 35501 2f9177a lstrcpy 35500->35501 35501->35500 35503 2f91668 lstrcpy 35502->35503 35504 2f921a4 RegOpenKeyExA 35503->35504 35505 2f921e8 35504->35505 35506 2f9220a 35504->35506 35507 2f916b4 lstrcpy 35505->35507 35508 2f9222d RegEnumKeyExA 35506->35508 35509 2f9243f RegCloseKey 35506->35509 35519 2f921f7 35507->35519 35511 2f9243a 35508->35511 35512 2f92272 wsprintfA RegOpenKeyExA 35508->35512 35510 2f916b4 lstrcpy 35509->35510 35510->35519 35511->35509 35513 2f922f0 RegQueryValueExA 35512->35513 35514 2f922b6 RegCloseKey RegCloseKey 35512->35514 35515 2f92328 lstrlen 35513->35515 35516 2f9242e RegCloseKey 35513->35516 35517 2f916b4 lstrcpy 35514->35517 35515->35516 35518 2f9233e 35515->35518 35516->35511 35517->35519 35520 2f9185b 4 API calls 35518->35520 35519->35052 35521 2f92355 35520->35521 35522 2f9177a lstrcpy 35521->35522 35523 2f92361 35522->35523 35524 2f9185b 4 API calls 35523->35524 35525 2f92385 35524->35525 35526 2f9177a lstrcpy 35525->35526 35527 2f92391 35526->35527 35528 2f9239c RegQueryValueExA 35527->35528 35528->35516 35529 2f923d0 35528->35529 35530 2f9185b 4 API calls 35529->35530 35531 2f923e7 35530->35531 35532 2f9177a lstrcpy 35531->35532 35533 2f923f3 35532->35533 35534 2f9185b 4 API calls 35533->35534 35535 2f92417 35534->35535 35536 2f9177a lstrcpy 35535->35536 35537 2f92423 35536->35537 35537->35516 35539 2f98dc7 35538->35539 35560 2f91b5b GetProcessHeap RtlAllocateHeap RegOpenKeyExA 35557->35560 35559 2f91b06 35559->35402 35559->35403 35561 2f91bb8 RegCloseKey 35560->35561 35562 2f91b9f RegQueryValueExA 35560->35562 35563 2f91bc9 35561->35563 35562->35561 35563->35559 35565 2f926da 35564->35565 35566 2f92780 FileTimeToSystemTime GetProcessHeap RtlAllocateHeap wsprintfA 35565->35566 35567 2f926fd SysAllocString 35565->35567 35566->35421 35567->35566 35569 2f9270f 35567->35569 35568 2f92777 SysFreeString 35568->35566 35569->35568 35570 2f92752 SysFreeString 35569->35570 35570->35568 35571->35437 35572->35477 35573->35477 35574->35475 35575->35472 35577 2f920ab GlobalMemoryStatusEx 35576->35577 35577->35482 35686->33104 35687->33108 35688->33030 35689 94037d 35690 94038b 35689->35690 35703 940ccd 35690->35703 35692 940523 GetPEB 35694 9405a0 35692->35694 35693 9404de 35693->35692 35701 940811 35693->35701 35706 940a8d 35694->35706 35697 940601 CreateThread 35698 9405d9 35697->35698 35716 94093d GetPEB 35697->35716 35698->35701 35714 940f8d GetPEB 35698->35714 35700 940a8d 4 API calls 35700->35701 35702 94065b 35702->35700 35702->35701 35704 940cda 35703->35704 35715 940ced GetPEB 35703->35715 35704->35693 35707 940aa3 CreateToolhelp32Snapshot 35706->35707 35709 940ada Thread32First 35707->35709 35710 9405d3 35707->35710 35709->35710 35711 940b01 35709->35711 35710->35697 35710->35698 35711->35710 35712 940b38 Wow64SuspendThread 35711->35712 35713 940b62 FindCloseChangeNotification 35711->35713 35712->35713 35713->35711 35714->35702 35715->35704 35719 940996 35716->35719 35717 9409f6 CreateThread 35717->35719 35720 94116d 35717->35720 35718 940a43 35719->35717 35719->35718 35721 941172 35720->35721 35722 2f92213 15 API calls

                      Control-flow Graph

                      APIs
                      • lstrlenW.KERNEL32(02FAA100), ref: 02F9A776
                      • lstrlenW.KERNEL32(02FA9F40), ref: 02F9A781
                      • lstrlenW.KERNEL32(02FA9CF0), ref: 02F9A78C
                      • lstrlenW.KERNEL32(02FA9AB8), ref: 02F9A797
                      • lstrlenW.KERNEL32(02FA9938), ref: 02F9A7A2
                      • LoadLibraryA.KERNEL32(02FA9924), ref: 02F9A7AD
                      • GetProcAddress.KERNEL32(00000000,02FA991C), ref: 02F9A7C4
                      • GetProcAddress.KERNEL32(00000000,02FA990C), ref: 02F9A7D7
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • Sleep.KERNEL32(00000014), ref: 02F9A7E4
                      • Sleep.KERNEL32(00000014), ref: 02F9A7EC
                      • Sleep.KERNEL32(00000014), ref: 02F9A7F4
                      • Sleep.KERNEL32(00000014), ref: 02F9A7FC
                      • Sleep.KERNEL32(00000014), ref: 02F9A804
                      • Sleep.KERNEL32(00000014), ref: 02F9A80C
                      • lstrlenW.KERNEL32(02FAA100), ref: 02F9A817
                      • lstrlenW.KERNEL32(02FA9F40), ref: 02F9A822
                      • lstrlenW.KERNEL32(02FA9CF0), ref: 02F9A82D
                      • lstrlenW.KERNEL32(02FA9AB8), ref: 02F9A838
                      • lstrlenW.KERNEL32(02FA9938), ref: 02F9A843
                      • Sleep.KERNEL32(00000014), ref: 02F9A84B
                      • Sleep.KERNEL32(00000014), ref: 02F9A853
                      • Sleep.KERNEL32(00000014), ref: 02F9A85B
                      • Sleep.KERNEL32(00000014), ref: 02F9A863
                      • Sleep.KERNEL32(00000014), ref: 02F9A86B
                      • Sleep.KERNEL32(00000014), ref: 02F9A873
                      • Sleep.KERNEL32(00000014), ref: 02F9A880
                      • Sleep.KERNEL32(00000014), ref: 02F9A888
                      • Sleep.KERNEL32(00000014), ref: 02F9A890
                      • Sleep.KERNEL32(00000014), ref: 02F9A898
                      • Sleep.KERNEL32(00000014), ref: 02F9A8A0
                      • Sleep.KERNEL32(00000014), ref: 02F9A8A8
                      • Sleep.KERNEL32(00000014), ref: 02F9A8B5
                      • Sleep.KERNEL32(00000014), ref: 02F9A8BD
                      • Sleep.KERNEL32(00000014), ref: 02F9A8C5
                      • Sleep.KERNEL32(00000014), ref: 02F9A8CD
                      • Sleep.KERNEL32(00000014), ref: 02F9A8D5
                      • Sleep.KERNEL32(00000014), ref: 02F9A8DD
                      • Sleep.KERNEL32(00000014), ref: 02F9A8E5
                      • Sleep.KERNEL32(00000014), ref: 02F9A8ED
                      • Sleep.KERNEL32(00000014), ref: 02F9A8F5
                      • Sleep.KERNEL32(00000014), ref: 02F9A8FD
                      • Sleep.KERNEL32(00000014), ref: 02F9A905
                      • Sleep.KERNEL32(00000014), ref: 02F9A90D
                      • Sleep.KERNEL32(00000014,02FA5200), ref: 02F9A922
                      • Sleep.KERNEL32(00000014), ref: 02F9A92A
                      • Sleep.KERNEL32(00000014), ref: 02F9A932
                      • Sleep.KERNEL32(00000014), ref: 02F9A93A
                      • Sleep.KERNEL32(00000014), ref: 02F9A942
                      • Sleep.KERNEL32(00000014), ref: 02F9A94A
                      • Sleep.KERNEL32(00000014,00000000,?,?,02FA8E5C,?,00000000), ref: 02F9A9A6
                      • Sleep.KERNEL32(00000014), ref: 02F9A9AE
                      • Sleep.KERNEL32(00000014), ref: 02F9A9B6
                      • Sleep.KERNEL32(00000014), ref: 02F9A9BE
                      • Sleep.KERNEL32(00000014), ref: 02F9A9C6
                      • Sleep.KERNEL32(00000014), ref: 02F9A9CE
                      • Sleep.KERNEL32(00000014), ref: 02F9A9D6
                      • Sleep.KERNEL32(00000014), ref: 02F9A9DE
                      • Sleep.KERNEL32(00000014), ref: 02F9A9E6
                      • Sleep.KERNEL32(00000014), ref: 02F9A9EE
                      • Sleep.KERNEL32(00000014), ref: 02F9A9F6
                      • Sleep.KERNEL32(00000014), ref: 02F9A9FE
                      • Sleep.KERNEL32(00000014), ref: 02F9AA0F
                      • Sleep.KERNEL32(00000014), ref: 02F9AA17
                      • Sleep.KERNEL32(00000014), ref: 02F9AA1F
                      • Sleep.KERNEL32(00000014), ref: 02F9AA27
                      • Sleep.KERNEL32(00000014), ref: 02F9AA2F
                      • Sleep.KERNEL32(00000014), ref: 02F9AA37
                      • OpenEventA.KERNEL32(001F0003,00000000,00000000), ref: 02F9AA4D
                      • Sleep.KERNEL32(00000014), ref: 02F9AA5E
                      • Sleep.KERNEL32(00000014), ref: 02F9AA66
                      • Sleep.KERNEL32(00000014), ref: 02F9AA6E
                      • Sleep.KERNEL32(00000014), ref: 02F9AA76
                      • Sleep.KERNEL32(00000014), ref: 02F9AA7E
                      • Sleep.KERNEL32(00000014), ref: 02F9AA86
                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 02F9AA9B
                      • Sleep.KERNEL32(00000014), ref: 02F9AAA6
                      • Sleep.KERNEL32(00000014), ref: 02F9AAAE
                      • Sleep.KERNEL32(00000014), ref: 02F9AAB6
                      • Sleep.KERNEL32(00000014), ref: 02F9AABE
                      • Sleep.KERNEL32(00000014), ref: 02F9AAC6
                      • Sleep.KERNEL32(00000014), ref: 02F9AACE
                      • Sleep.KERNEL32(00000014), ref: 02F9AADA
                      • Sleep.KERNEL32(00000014), ref: 02F9AAE2
                      • Sleep.KERNEL32(00000014), ref: 02F9AAEA
                      • Sleep.KERNEL32(00000014), ref: 02F9AAF2
                      • Sleep.KERNEL32(00000014), ref: 02F9AAFA
                      • Sleep.KERNEL32(00000014), ref: 02F9AB02
                      • CloseHandle.KERNEL32(00000000), ref: 02F9AB0B
                      • Sleep.KERNEL32(00001B58), ref: 02F9AB16
                      • Sleep.KERNEL32(00000014), ref: 02F9AB1E
                      • Sleep.KERNEL32(00000014), ref: 02F9AB26
                      • Sleep.KERNEL32(00000014), ref: 02F9AB2E
                      • Sleep.KERNEL32(00000014), ref: 02F9AB36
                      • Sleep.KERNEL32(00000014), ref: 02F9AB3E
                      • Sleep.KERNEL32(00000014), ref: 02F9AB46
                      • Sleep.KERNEL32(00000014), ref: 02F9AB53
                      • Sleep.KERNEL32(00000014), ref: 02F9AB5B
                      • Sleep.KERNEL32(00000014), ref: 02F9AB63
                      • Sleep.KERNEL32(00000014), ref: 02F9AB6B
                      • Sleep.KERNEL32(00000014), ref: 02F9AB73
                      • Sleep.KERNEL32(00000014), ref: 02F9AB7B
                      • Sleep.KERNEL32(00000014), ref: 02F9AB83
                      • Sleep.KERNEL32(00000014), ref: 02F9AB8B
                      • Sleep.KERNEL32(00000014), ref: 02F9AB93
                      • Sleep.KERNEL32(00000014), ref: 02F9AB9B
                      • Sleep.KERNEL32(00000014), ref: 02F9ABA3
                      • Sleep.KERNEL32(00000014), ref: 02F9ABAB
                      • Sleep.KERNEL32(00000014), ref: 02F9ABB8
                      • Sleep.KERNEL32(00000014), ref: 02F9ABC0
                      • Sleep.KERNEL32(00000014), ref: 02F9ABC8
                      • Sleep.KERNEL32(00000014), ref: 02F9ABD0
                      • Sleep.KERNEL32(00000014), ref: 02F9ABD8
                      • Sleep.KERNEL32(00000014), ref: 02F9ABE0
                      • Sleep.KERNEL32(00000014), ref: 02F9ABE8
                      • Sleep.KERNEL32(00000014), ref: 02F9ABF0
                      • Sleep.KERNEL32(00000014), ref: 02F9ABF8
                      • Sleep.KERNEL32(00000014), ref: 02F9AC00
                      • Sleep.KERNEL32(00000014), ref: 02F9AC08
                      • Sleep.KERNEL32(00000014), ref: 02F9AC10
                      • CloseHandle.KERNEL32(?), ref: 02F9AC19
                      • Sleep.KERNEL32(00000014), ref: 02F9AC21
                      • Sleep.KERNEL32(00000014), ref: 02F9AC29
                      • Sleep.KERNEL32(00000014), ref: 02F9AC31
                      • Sleep.KERNEL32(00000014), ref: 02F9AC39
                      • Sleep.KERNEL32(00000014), ref: 02F9AC41
                      • Sleep.KERNEL32(00000014), ref: 02F9AC49
                      • Sleep.KERNEL32(00000014), ref: 02F9AC51
                      • Sleep.KERNEL32(00000014), ref: 02F9AC59
                      • Sleep.KERNEL32(00000014), ref: 02F9AC61
                      • Sleep.KERNEL32(00000014), ref: 02F9AC69
                      • Sleep.KERNEL32(00000014), ref: 02F9AC71
                      • Sleep.KERNEL32(00000014), ref: 02F9AC79
                      • Sleep.KERNEL32(00000014), ref: 02F9AC81
                      • Sleep.KERNEL32(00000014), ref: 02F9AC89
                      • Sleep.KERNEL32(00000014), ref: 02F9AC91
                      • Sleep.KERNEL32(00000014), ref: 02F9AC99
                      • Sleep.KERNEL32(00000014), ref: 02F9ACA1
                      • Sleep.KERNEL32(00000014), ref: 02F9ACA9
                      • ExitProcess.KERNEL32 ref: 02F9ACB1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Sleep$lstrlen$AddressCloseEventHandleProclstrcpy$CreateExitLibraryLoadOpenProcesslstrcat
                      • String ID:
                      • API String ID: 1968030747-0
                      • Opcode ID: 8383a8eac1abb5738f656640abd2cb80b8a82122ebb86d8dcd7bfe74855b0003
                      • Instruction ID: dfb7c89e150fa4858f847cf6c8ae0ae101806c65f14345dfb0e825716eeaa61f
                      • Opcode Fuzzy Hash: 8383a8eac1abb5738f656640abd2cb80b8a82122ebb86d8dcd7bfe74855b0003
                      • Instruction Fuzzy Hash: 6CD1AC715E125EBFEB047BE0A81EBE97E6AAB0CB42F544034B3069C1E5CAF054D09B71

                      Control-flow Graph

                      APIs
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B06C
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B083
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B09A
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B0B1
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B0C8
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B0DF
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B0F6
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B10D
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B124
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B13B
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B152
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B169
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B180
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B197
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B1AE
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B1C5
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B1DC
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B1F3
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B20A
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B221
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B238
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B24F
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B266
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B27D
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B294
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B2AB
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B2C2
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B2D9
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B2F0
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B307
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B31E
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B335
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B34C
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B363
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B37A
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B391
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B3A8
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B3BF
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B3D6
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B3ED
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B404
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B41B
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B432
                      • GetProcAddress.KERNEL32(02FAA450), ref: 02F9B448
                      • GetProcAddress.KERNEL32(02FAA43C), ref: 02F9B45E
                      • GetProcAddress.KERNEL32(02FAA428), ref: 02F9B474
                      • GetProcAddress.KERNEL32(02FAA418), ref: 02F9B48A
                      • GetProcAddress.KERNEL32(02FAA408), ref: 02F9B4A0
                      • GetProcAddress.KERNEL32(02FAA3F4), ref: 02F9B4B6
                      • GetProcAddress.KERNEL32(02FAA3E0), ref: 02F9B4CC
                      • LoadLibraryA.KERNEL32(?,02F9922C), ref: 02F9B4DD
                      • LoadLibraryA.KERNEL32(?,02F9922C), ref: 02F9B4EE
                      • LoadLibraryA.KERNEL32(?,02F9922C), ref: 02F9B4FF
                      • LoadLibraryA.KERNEL32(?,02F9922C), ref: 02F9B510
                      • LoadLibraryA.KERNEL32(?,02F9922C), ref: 02F9B521
                      • LoadLibraryA.KERNEL32(?,02F9922C), ref: 02F9B532
                      • LoadLibraryA.KERNEL32(?,02F9922C), ref: 02F9B543
                      • LoadLibraryA.KERNEL32(?,02F9922C), ref: 02F9B554
                      • LoadLibraryA.KERNEL32(02FAA3D4,?,02F9922C), ref: 02F9B564
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B584
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B59B
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B5B2
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B5C9
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B5E0
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B604
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B61B
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B632
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B649
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B660
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B677
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B68E
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B6A5
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B6C5
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B6DC
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B6F3
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B70A
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B721
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B745
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B75C
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B773
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B78A
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B7A1
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B7B8
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B7DC
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B7F3
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B80A
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B821
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B838
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B84F
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B866
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B87D
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B894
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B8B4
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B8CB
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B8E2
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B8F9
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B910
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B930
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B947
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B967
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B97E
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B9A2
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B9B9
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B9D0
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B9E7
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9B9FE
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BA15
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BA2C
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BA43
                      • GetProcAddress.KERNEL32(02FAA3C4), ref: 02F9BA59
                      • GetProcAddress.KERNEL32(02FAA3B0), ref: 02F9BA6F
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BA8F
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BAA6
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BABD
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BAD4
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BAF4
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BB14
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BB2B
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BB42
                      • GetProcAddress.KERNEL32(?,02F9922C), ref: 02F9BB59
                      • GetProcAddress.KERNEL32(02FAA3A0), ref: 02F9BB78
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID:
                      • API String ID: 2238633743-0
                      • Opcode ID: 1d785e602963b4d81dc4cb6035dd659ab20d531e26516bb353c2ca16bf2c4f3d
                      • Instruction ID: 2d6497051439c5450755d494b503d0b47909315db4ddbe034cd71909536817ee
                      • Opcode Fuzzy Hash: 1d785e602963b4d81dc4cb6035dd659ab20d531e26516bb353c2ca16bf2c4f3d
                      • Instruction Fuzzy Hash: 6A52E9794A5210FFEB0E7F61FA09AA53FA2F70C3457444539E9029122EE77648E4EF60

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1567 2f84ad5-2f84b4e call 2f916b4 call 2f8430f GetProcessHeap RtlAllocateHeap call 2f9193a 1573 2f84b53-2f84b75 InternetOpenA StrCmpCA 1567->1573 1574 2f84b7e-2f84b82 1573->1574 1575 2f84b77 1573->1575 1576 2f84b88-2f84bb4 InternetConnectA 1574->1576 1577 2f84dad-2f84df9 InternetCloseHandle call 2f91701 * 2 1574->1577 1575->1574 1578 2f84bba-2f84bc5 1576->1578 1579 2f84da1-2f84da7 InternetCloseHandle 1576->1579 1591 2f84dff-2f84e02 1577->1591 1581 2f84bd3 1578->1581 1582 2f84bc7-2f84bd1 1578->1582 1579->1577 1584 2f84bdd-2f84c0d HttpOpenRequestA 1581->1584 1582->1584 1586 2f84d98-2f84d9b InternetCloseHandle 1584->1586 1587 2f84c13-2f84c17 1584->1587 1586->1579 1589 2f84c19-2f84c38 InternetSetOptionA 1587->1589 1590 2f84c3e-2f84c7c HttpSendRequestA HttpQueryInfoA 1587->1590 1589->1590 1592 2f84cbe-2f84cdb call 2f92b90 1590->1592 1593 2f84c7e-2f84cb9 call 2f91701 * 2 1590->1593 1599 2f84d5b-2f84d96 call 2f91701 * 2 1592->1599 1600 2f84cdd-2f84ce4 1592->1600 1593->1591 1599->1591 1603 2f84d59 1600->1603 1604 2f84ce6-2f84ced 1600->1604 1603->1586 1604->1603 1606 2f84cef-2f84d12 InternetReadFile 1604->1606 1608 2f84d21-2f84d2d 1606->1608 1609 2f84d2f-2f84d55 call 2f92c12 1608->1609 1610 2f84d57 1608->1610 1609->1608 1610->1604
                      APIs
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F84387
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F8439B
                        • Part of subcall function 02F8430F: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02F843B9
                        • Part of subcall function 02F8430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 02F843C9
                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 02F84B22
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F84B29
                      • InternetOpenA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02F84B54
                      • StrCmpCA.SHLWAPI(?), ref: 02F84B6D
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02F84BA1
                      • HttpOpenRequestA.WININET(00000000,02FA8D80,?,00000000,00000000,00400100,00000000), ref: 02F84C00
                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02F84C38
                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02F84C49
                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 02F84C74
                      • InternetReadFile.WININET(00000000,?,00000400,00000000), ref: 02F84D05
                      • InternetCloseHandle.WININET(00000000), ref: 02F84D9B
                      • InternetCloseHandle.WININET(00000000), ref: 02F84DA7
                      • InternetCloseHandle.WININET(00000000), ref: 02F84DC5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Internet$CloseHandleHttp$HeapOpenRequest$AllocateConnectCrackFileInfoOptionProcessQueryReadSendlstrcpylstrlen
                      • String ID:
                      • API String ID: 442264750-0
                      • Opcode ID: bc4fd7d68c3ceda8383b8d059e16ca8294943c2b7b4bb4840b2753a7e60966ab
                      • Instruction ID: eb8a4d4cfb03a9c5e619e98693272e4782659e3b553ec79a7a32dfc0d59e31b4
                      • Opcode Fuzzy Hash: bc4fd7d68c3ceda8383b8d059e16ca8294943c2b7b4bb4840b2753a7e60966ab
                      • Instruction Fuzzy Hash: 499115B1D4022DABEF20EF60DC44BEEBBB5BB08346F1040E5E609A6191DB756AC4CF14
                      APIs
                      • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000,00000000), ref: 00977DD6
                      • NtMapViewOfSection.NTDLL(?,00000000), ref: 00977E7E
                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 009781F2
                      • NtMapViewOfSection.NTDLL(?,00000000,?,?,?,?,?,?), ref: 009782A7
                      • VirtualProtect.KERNEL32(?,?,00000008,?,?,?,?,?,?,?), ref: 009782C4
                      • VirtualProtect.KERNEL32(?,?,?,00000000), ref: 00978367
                      • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,?,?,?,?), ref: 0097839A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000976000.00000040.00001000.00020000.00000000.sdmp, Offset: 00976000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_976000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: Virtual$ProtectSection$View$AllocCreate
                      • String ID:
                      • API String ID: 2664363762-0
                      • Opcode ID: 42def313b3f27d7dbc40fe03692585391203b583680a0eb8e46ebb5996ff43a6
                      • Instruction ID: 320e187601c9f200fd25b6620b589ff29bf37645bf90fcd8797486fc92d1d9d2
                      • Opcode Fuzzy Hash: 42def313b3f27d7dbc40fe03692585391203b583680a0eb8e46ebb5996ff43a6
                      • Instruction Fuzzy Hash: 65428C72648301AFD724CF24CC48B6BBBE9EF88714F14892DF9899B251EB74E845CB51
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91AF1
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F91AF8
                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,?), ref: 02F91B29
                      • RegQueryValueExA.KERNEL32(?,00000000,00000000,?,000000FF), ref: 02F91B47
                      • RegCloseKey.ADVAPI32(?), ref: 02F91B50
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                      • String ID: Windows 11
                      • API String ID: 3225020163-2517555085
                      • Opcode ID: 2efced819c014a7475f1b5b879641aabf04030cd8a253f5af2e1ffab870a804b
                      • Instruction ID: ced48e507eb47a4401b507a9f01f605f696bad5a55ac3370bb5abf343aa36dca
                      • Opcode Fuzzy Hash: 2efced819c014a7475f1b5b879641aabf04030cd8a253f5af2e1ffab870a804b
                      • Instruction Fuzzy Hash: 48011975A80209FBEF14BFA4DC0AB9E7BB9FB08784F100070F705A6095E77196949B20
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02F938F5
                      • Process32First.KERNEL32(?,00000128), ref: 02F93908
                      • Process32Next.KERNEL32(?,00000128), ref: 02F9391C
                      • StrCmpCA.SHLWAPI(?,?), ref: 02F93930
                      • FindCloseChangeNotification.KERNEL32(?), ref: 02F93943
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                      • String ID:
                      • API String ID: 3243318325-0
                      • Opcode ID: f69444655a90166b5c3cc8b9c9f002ddf23f9e1c610ceac2ec6bdd93d6ee477d
                      • Instruction ID: 22e0f501780685dbe28835847810e269be43a4408d9c4feff7515635929bb8d2
                      • Opcode Fuzzy Hash: f69444655a90166b5c3cc8b9c9f002ddf23f9e1c610ceac2ec6bdd93d6ee477d
                      • Instruction Fuzzy Hash: 3211C271D44259EFEF119F91CC19BFEBFB9FB08795F0001A9EA01A2290D7749A40CB60
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000004,00000000,?,?,?,?,?,009405D3,?,00000001,?,81EC8B55,000000FF), ref: 00940ACB
                      • Thread32First.KERNEL32(00000000,0000001C), ref: 00940AF7
                      • Wow64SuspendThread.KERNEL32(00000000), ref: 00940B4A
                      • FindCloseChangeNotification.KERNEL32(00000000), ref: 00940B74
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: ChangeCloseCreateFindFirstNotificationSnapshotSuspendThreadThread32Toolhelp32Wow64
                      • String ID:
                      • API String ID: 376097663-0
                      • Opcode ID: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                      • Instruction ID: f9da47013b434fd643a6c8e1fdea333da52a4f0bf7c63a295dee648e095a8742
                      • Opcode Fuzzy Hash: ed4f7e93d5c748d87e273fbd072de27cfcb41b6612c19f34ce8dd7f2a24eca5e
                      • Instruction Fuzzy Hash: D0410C71A00108AFDB18DFA8C990FADB7F6EFC8304F10C168E6159B7A4DA34AE45CB54
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91CCF
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F91CD6
                      • GetTimeZoneInformation.KERNEL32(?), ref: 02F91CE9
                      • wsprintfA.USER32 ref: 02F91D20
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                      • String ID:
                      • API String ID: 3317088062-0
                      • Opcode ID: 745d9b9381bf291212f1c08244f2f52f76fb427e3d729f7f41202ff21703d958
                      • Instruction ID: b59e395b114c6b289b5c5435fca83b379e76dc93f8a20866a949920868174aab
                      • Opcode Fuzzy Hash: 745d9b9381bf291212f1c08244f2f52f76fb427e3d729f7f41202ff21703d958
                      • Instruction Fuzzy Hash: 09F05B71D44318AFEB24BB24DC49B95777ABB04355F0001E5F609A6191D7749AC4CF52
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91BF8
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F91BFF
                      • GetUserNameA.ADVAPI32(?,00000104), ref: 02F91C16
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap$AllocateNameProcessUser
                      • String ID:
                      • API String ID: 1296208442-0
                      • Opcode ID: 7f2fe1993ac94138236298effdf56df0d59f1d172e0784061dc4d8f67b7cb0a3
                      • Instruction ID: 10274e94065b34465b1967c8a2b02e58402063daf332ced9b6f94574c6d8c86b
                      • Opcode Fuzzy Hash: 7f2fe1993ac94138236298effdf56df0d59f1d172e0784061dc4d8f67b7cb0a3
                      • Instruction Fuzzy Hash: 1BE026F4D4020DFFDB00DB94D84AB9DBBB8EB04745F908455A601A2150D6B45A549B60
                      APIs
                      • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00940A09
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateThread
                      • String ID: ,
                      • API String ID: 2422867632-3772416878
                      • Opcode ID: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                      • Instruction ID: 3e18605c10f506f479e1e5a0f6788849fa0cebc7e0445ce31945ccb7920274e2
                      • Opcode Fuzzy Hash: fc60953fbf7661c618888493d7684cefa6d88d8934743e077e5b29c3addb46ae
                      • Instruction Fuzzy Hash: 0F41C174A00209EFDB14CF98C994BAEB7B1FF88314F208698D515AB381D775AE81DF94
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: InfoSystemwsprintf
                      • String ID:
                      • API String ID: 2452939696-0
                      • Opcode ID: de14122045c32c5e25ee2cc50d20b26054f1a6f196519052eb8787c2fa1b9713
                      • Instruction ID: 1b795a574b47307fbd0ef7d5170e686faf05d22c50492d1dda931bcffaea4edb
                      • Opcode Fuzzy Hash: de14122045c32c5e25ee2cc50d20b26054f1a6f196519052eb8787c2fa1b9713
                      • Instruction Fuzzy Hash: CAD05EF180021CABDB00EBE4EC499D97BBCBB08208F4408B1E715E2041E3F4E6D88BE4
                      APIs
                      • CreateThread.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,?,00000001,?,81EC8B55,000000FF), ref: 00940620
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: d1867d65438df7f4ba1faff640181a03717b11aaafb002cc76c39316aa089a81
                      • Instruction ID: 6effc7fa976747c307b720568620bcd20cb0628cce80f66f72e4525ebe496470
                      • Opcode Fuzzy Hash: d1867d65438df7f4ba1faff640181a03717b11aaafb002cc76c39316aa089a81
                      • Instruction Fuzzy Hash: DE12D2B4E00219DFDB14CF98C990BADBBB1FF88304F2486A9E615AB385D7356A41CF54

                      Control-flow Graph

                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Sleep$CloseEventHandle$CreateExitOpenProcess
                      • String ID:
                      • API String ID: 3990214622-0
                      • Opcode ID: f272b5dccdab99b60ecd536f8fb32ba91250107cee5cd3f403f23d7be1450420
                      • Instruction ID: 7357fb167c691705bebfd37f7e85373a6b0d1fb25ebd7fe7a20cb2b1c04abdc3
                      • Opcode Fuzzy Hash: f272b5dccdab99b60ecd536f8fb32ba91250107cee5cd3f403f23d7be1450420
                      • Instruction Fuzzy Hash: 8F5157316E525EBFEB047BE0990EBE83E66AB1C746F140034B30A9D1E6CAF145D49B31

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 79 2f84e03-2f84ef7 call 2f91668 call 2f916b4 call 2f8430f call 2f9302d call 2f9193a lstrlen call 2f9193a call 2f9302d call 2f91668 * 4 StrCmpCA 102 2f84ef9 79->102 103 2f84f00-2f84f04 79->103 102->103 104 2f84f20-2f84f24 103->104 105 2f84f06-2f84f1d call 2f9193a InternetOpenA 103->105 107 2f8582a-2f858ba call 2f92bcb * 2 call 2f918d5 * 4 call 2f916b4 call 2f91701 * 9 104->107 108 2f84f2a-2f85038 call 2f92d64 call 2f917e0 call 2f9177a call 2f91701 * 2 call 2f9185b call 2f917e0 call 2f9185b call 2f9177a call 2f91701 * 3 call 2f9185b call 2f917e0 call 2f9177a call 2f91701 * 2 InternetConnectA 104->108 105->104 175 2f858bd-2f858c0 107->175 108->107 177 2f8503e-2f85049 108->177 178 2f8504b-2f85055 177->178 179 2f85057 177->179 180 2f85061-2f8508f HttpOpenRequestA 178->180 179->180 181 2f8581e-2f85824 InternetCloseHandle 180->181 182 2f85095-2f85099 180->182 181->107 183 2f8509b-2f850ba InternetSetOptionA 182->183 184 2f850c0-2f85669 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f82278 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9193a lstrlen call 2f9193a lstrlen GetProcessHeap RtlAllocateHeap call 2f9193a lstrlen call 2f9193a memcpy call 2f9193a lstrlen memcpy call 2f9193a lstrlen call 2f9193a * 2 lstrlen memcpy call 2f9193a lstrlen call 2f9193a HttpSendRequestA call 2f92bcb 182->184 183->184 388 2f8566e-2f85695 HttpQueryInfoA 184->388 389 2f856f7-2f85714 call 2f92b90 388->389 390 2f85697-2f856f2 call 2f91668 call 2f91701 * 9 388->390 396 2f8571a-2f85743 InternetReadFile 389->396 397 2f857b5-2f85810 call 2f91668 call 2f91701 * 9 389->397 390->175 400 2f8574e-2f857a9 call 2f9193a StrCmpCA 396->400 401 2f85745-2f8574c 396->401 397->175 414 2f857ab-2f857ad ExitProcess 400->414 415 2f857b3-2f85818 InternetCloseHandle 400->415 401->400 404 2f85750-2f8578e call 2f9185b call 2f9177a call 2f91701 401->404 404->396 415->181
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F84387
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F8439B
                        • Part of subcall function 02F8430F: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02F843B9
                        • Part of subcall function 02F8430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 02F843C9
                      • lstrlen.KERNEL32(00000000), ref: 02F84E8B
                        • Part of subcall function 02F9302D: CryptBinaryToStringA.CRYPT32(00000000,02F84E7F,40000001,00000000,00000000), ref: 02F9304A
                      • StrCmpCA.SHLWAPI(?,02FA5200,02FA5200,02FA5200,02FA5200), ref: 02F84EEF
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F84F17
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02F85025
                      • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,00400100,00000000), ref: 02F85082
                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02F850BA
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                      • lstrlen.KERNEL32(00000000,00000000,?,02FA8D60,00000000,?,02FA8D94,00000000,?,00000000,?,02FA8D7C,00000000,?,00000000,00000000), ref: 02F85579
                      • lstrlen.KERNEL32(00000000), ref: 02F8558D
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 02F8559D
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F855A4
                      • lstrlen.KERNEL32(00000000), ref: 02F855B9
                      • memcpy.MSVCRT ref: 02F855CF
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 02F855E6
                      • memcpy.MSVCRT ref: 02F855F3
                      • lstrlen.KERNEL32(00000000), ref: 02F85604
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 02F8561D
                      • memcpy.MSVCRT ref: 02F8562D
                      • lstrlen.KERNEL32(00000000,?,?), ref: 02F85647
                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 02F8565A
                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 02F8568D
                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 02F85730
                      • StrCmpCA.SHLWAPI(00000000,02FA8D84), ref: 02F857A1
                      • ExitProcess.KERNEL32 ref: 02F857AD
                      • InternetCloseHandle.WININET(00000000), ref: 02F85824
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrlen$Internet$lstrcpy$Httpmemcpy$HeapOpenProcessRequestlstrcat$AllocateBinaryCloseConnectCrackCryptExitFileHandleInfoOptionQueryReadSendString
                      • String ID:
                      • API String ID: 1402206147-0
                      • Opcode ID: e3434e3b3524ebc8bd6f96a596d98d899eb9b8ed5056f7cf61cef7391578ce0d
                      • Instruction ID: e331e3b1e3a571a2dce3a9936120564dcb25bc9a415c24cc149096004c647552
                      • Opcode Fuzzy Hash: e3434e3b3524ebc8bd6f96a596d98d899eb9b8ed5056f7cf61cef7391578ce0d
                      • Instruction Fuzzy Hash: F652BD72D0021EAAEF15FB60DCA0EDEB77AAF15381F5041B5E61AB2090DF716A48CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 450 2f858c4-2f8597d call 2f916b4 call 2f8430f call 2f91668 * 5 call 2f9193a InternetOpenA StrCmpCA 467 2f8597f 450->467 468 2f85986-2f8598a 450->468 467->468 469 2f85990-2f85b02 call 2f92d64 call 2f917e0 call 2f9177a call 2f91701 * 2 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f917e0 call 2f9177a call 2f91701 * 2 InternetConnectA 468->469 470 2f86073-2f8609a InternetCloseHandle call 2f9193a call 2f87dc2 468->470 469->470 554 2f85b08-2f85b13 469->554 479 2f860d8-2f8613e call 2f92bcb * 2 call 2f916b4 call 2f91701 * 5 call 2f8131a call 2f91701 470->479 480 2f8609c-2f860d3 call 2f91715 call 2f9185b call 2f9177a call 2f91701 470->480 480->479 555 2f85b21 554->555 556 2f85b15-2f85b1f 554->556 557 2f85b2b-2f85b59 HttpOpenRequestA 555->557 556->557 558 2f85b5f-2f85b63 557->558 559 2f86067-2f8606d InternetCloseHandle 557->559 560 2f85b8a-2f85fe2 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f82278 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9193a lstrlen call 2f9193a lstrlen GetProcessHeap RtlAllocateHeap call 2f9193a lstrlen call 2f9193a memcpy call 2f9193a lstrlen call 2f9193a * 2 lstrlen memcpy call 2f9193a lstrlen call 2f9193a HttpSendRequestA 558->560 561 2f85b65-2f85b84 InternetSetOptionA 558->561 559->470 720 2f85fe8-2f86011 InternetReadFile 560->720 561->560 721 2f8601c-2f86061 InternetCloseHandle 720->721 722 2f86013-2f8601a 720->722 721->559 722->721 723 2f8601e-2f8605c call 2f9185b call 2f9177a call 2f91701 722->723 723->720
                      APIs
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F84387
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F8439B
                        • Part of subcall function 02F8430F: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02F843B9
                        • Part of subcall function 02F8430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 02F843C9
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F8595F
                      • StrCmpCA.SHLWAPI(?), ref: 02F85975
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02F85AEF
                      • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,00400100,00000000), ref: 02F85B4C
                      • lstrlen.KERNEL32(00000000,00000000,?,?,00000000,?,02FA8D60,00000000,?,02FA8DB4,00000000,?,00000000,?,02FA8D7C,00000000), ref: 02F85F2B
                      • lstrlen.KERNEL32(00000000), ref: 02F85F3C
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 02F85F4C
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F85F53
                      • lstrlen.KERNEL32(00000000), ref: 02F85F68
                      • memcpy.MSVCRT ref: 02F85F7E
                      • lstrlen.KERNEL32(00000000), ref: 02F85F8F
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 02F85FA8
                      • memcpy.MSVCRT ref: 02F85FB5
                      • lstrlen.KERNEL32(00000000,?,?), ref: 02F85FCF
                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 02F85FE2
                      • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 02F85FFE
                      • InternetCloseHandle.WININET(00000000), ref: 02F86061
                      • InternetCloseHandle.WININET(00000000), ref: 02F8606D
                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02F85B84
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                      • InternetCloseHandle.WININET(00000000), ref: 02F86076
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Internetlstrlen$lstrcpy$CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileOptionProcessReadSend
                      • String ID:
                      • API String ID: 3096766799-0
                      • Opcode ID: 52d2a762ac38d543be935cd40b0760002e26ce1b17847884047889bd0d2a4e0a
                      • Instruction ID: bb53a6692c1c77a30eaf4f57437559e923226258ac0d4df336faa9f063af2cf2
                      • Opcode Fuzzy Hash: 52d2a762ac38d543be935cd40b0760002e26ce1b17847884047889bd0d2a4e0a
                      • Instruction Fuzzy Hash: D9329C7281011EAAEF15FBA0DD94EDEB77ABF14781F5001B5E60AA20A0DF716B48CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 731 2fa095b-2fa0975 732 2fa0981-2fa098d 731->732 733 2fa0977-2fa097c 731->733 735 2fa0999-2fa09a9 732->735 736 2fa098f-2fa0994 732->736 734 2fa13c9-2fa13cb 733->734 737 2fa09bb-2fa09d4 lstrcpy 735->737 738 2fa09ab-2fa09af 735->738 736->734 740 2fa09e0-2fa09e6 737->740 741 2fa09d6-2fa09db 737->741 738->737 739 2fa09b1 738->739 739->737 742 2fa09ec-2fa09f7 740->742 741->734 743 2fa09f9-2fa0a05 742->743 744 2fa0a1f-2fa0a31 742->744 747 2fa0a10-2fa0a1d 743->747 748 2fa0a07-2fa0a0d 743->748 745 2fa0a59 744->745 746 2fa0a33-2fa0a4b call 2fa17e2 744->746 750 2fa0a60-2fa0a76 745->750 746->745 754 2fa0a4d-2fa0a57 746->754 747->742 748->747 752 2fa0a78-2fa0a8a call 2f9f930 750->752 753 2fa0a8c 750->753 752->753 756 2fa0a90-2fa0a94 752->756 753->756 754->750 758 2fa0aa9-2fa0aad 756->758 759 2fa0a96-2fa0aa7 call 2fa01a9 756->759 760 2fa0aaf-2fa0ac3 call 2fa0255 758->760 761 2fa0ac5-2fa0ac9 758->761 771 2fa0b01-2fa0b05 759->771 760->771 764 2fa0acb-2fa0adf call 2fa03dd 761->764 765 2fa0ae1-2fa0ae5 761->765 764->771 769 2fa0af7-2fa0afc 765->769 770 2fa0ae7-2fa0af5 call 2fa04e9 765->770 769->734 770->771 774 2fa0b0f-2fa0b55 lstrcpy * 2 lstrlen 771->774 775 2fa0b07-2fa0b0a 771->775 777 2fa0b76-2fa0c0b lstrcpy 774->777 778 2fa0b57-2fa0b70 lstrcat 774->778 775->734 779 2fa0c1f-2fa0c3c 777->779 780 2fa0c0d-2fa0c13 777->780 778->777 782 2fa0c3e-2fa0c48 779->782 783 2fa0c61 779->783 780->779 781 2fa0c15-2fa0c18 780->781 781->779 782->783 784 2fa0c4a-2fa0c5f 782->784 785 2fa0c68-2fa0e54 call 2fa1b40 * 9 memcpy call 2f9e919 783->785 784->785 806 2fa0e6b-2fa0e97 785->806 807 2fa0e56-2fa0e66 call 2fa070a 785->807 808 2fa0e99-2fa0ead call 2fa070a 806->808 809 2fa0eb2-2fa0ee7 806->809 807->734 808->734 812 2fa0ef6-2fa0efd 809->812 815 2fa0f29-2fa0f32 812->815 816 2fa0eff-2fa0f0a 812->816 818 2fa0f4b-2fa0f52 815->818 819 2fa0f34-2fa0f4a GetTickCount GetDesktopWindow call 2fa1842 815->819 816->815 817 2fa0f0c-2fa0f27 call 2f9f864 816->817 817->812 822 2fa0f61-2fa0f68 818->822 819->818 823 2fa0f6a-2fa0f81 rand 822->823 824 2fa0f83-2fa0f9b 822->824 823->822 828 2fa0faa-2fa0fb1 824->828 830 2fa0fdc-2fa0fe5 828->830 831 2fa0fb3-2fa0fda call 2f9f907 828->831 833 2fa1018-2fa1025 830->833 834 2fa0fe7-2fa0fed 830->834 831->828 837 2fa103b 833->837 838 2fa1027-2fa102d 833->838 834->833 836 2fa0fef-2fa1015 call 2f9ff44 834->836 836->833 839 2fa1042-2fa1057 837->839 838->837 842 2fa102f-2fa1039 838->842 843 2fa1059-2fa105d 839->843 844 2fa1076-2fa107c 839->844 842->839 843->844 846 2fa105f-2fa106c call 2fa0788 843->846 847 2fa107e-2fa1082 844->847 848 2fa1094-2fa109a 844->848 853 2fa1071-2fa1074 846->853 847->848 850 2fa1084-2fa1092 call 2fa08e6 847->850 851 2fa10a9-2fa10e6 call 2fa070a 848->851 852 2fa109c-2fa10a2 848->852 850->851 858 2fa10e8-2fa10f1 851->858 859 2fa10f6-2fa10fa 851->859 852->851 853->851 858->734 860 2fa10fc-2fa1101 859->860 861 2fa1106-2fa116b 859->861 860->734 862 2fa1171-2fa117a 861->862 863 2fa1247-2fa1254 861->863 864 2fa1188-2fa119d 862->864 865 2fa117c-2fa1182 862->865 866 2fa1260-2fa1264 863->866 867 2fa1256-2fa125b 863->867 868 2fa119f-2fa11a9 864->868 869 2fa11b0-2fa11de call 2fa00c8 864->869 865->863 865->864 870 2fa127b-2fa12a2 call 2f9ecec 866->870 871 2fa1266-2fa126f 866->871 867->734 868->869 877 2fa11ea-2fa1211 call 2f9e919 869->877 878 2fa11e0-2fa11e5 869->878 879 2fa12ae-2fa12ca 870->879 880 2fa12a4-2fa12a9 870->880 871->870 873 2fa1271-2fa1276 871->873 873->734 887 2fa121d-2fa1236 call 2fa00c8 877->887 888 2fa1213-2fa1218 877->888 878->734 882 2fa12d1-2fa12db 879->882 880->734 883 2fa12eb-2fa1370 call 2f92b6b memcpy call 2f92b6b memcpy 882->883 884 2fa12dd-2fa12e6 882->884 896 2fa1372-2fa1381 883->896 897 2fa1383-2fa138c 883->897 884->734 893 2fa1238-2fa123d 887->893 894 2fa1242 887->894 888->734 893->734 894->882 898 2fa13c7 896->898 899 2fa1392-2fa139f 897->899 898->734 900 2fa13a1-2fa13b3 899->900 901 2fa13b5-2fa13c1 899->901 900->899 901->898
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: T$U
                      • API String ID: 0-2115836835
                      • Opcode ID: f212c1a9dbe602e5907e09758c857071885e3c502ffebd4a886c7e0a8c353d1b
                      • Instruction ID: 5b7c212cfcce902b1ea5c9fa64ffe51637c9c5ab857dadd9e10923a2abc24a90
                      • Opcode Fuzzy Hash: f212c1a9dbe602e5907e09758c857071885e3c502ffebd4a886c7e0a8c353d1b
                      • Instruction Fuzzy Hash: 956228B4E052A9CFDB20CF64D8A4BEAB7B5AF04345F0540DADA09A7251D734DE88CF58

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 902 2f98fd9-2f99078 call 2fa18f0 call 2f91668 call 2f9a3b1 call 2f9a3e6 call 2f91715 * 2 915 2f9907e-2f9908b 902->915 916 2f9908d-2f990b5 call 2f91648 * 2 915->916 917 2f990b7-2f990c7 915->917 916->915 919 2f990cd-2f990da 917->919 921 2f990dc-2f99104 call 2f91648 * 2 919->921 922 2f99106-2f99116 919->922 921->919 925 2f9911c-2f99129 922->925 926 2f9912b-2f99145 call 2f9a3e6 925->926 927 2f99147-2f99157 925->927 926->925 931 2f9915d-2f9916a 927->931 934 2f99188-2f99198 931->934 935 2f9916c-2f99186 call 2f9a410 931->935 938 2f9919e-2f991ab 934->938 935->931 940 2f991c9-2f991d9 938->940 941 2f991ad-2f991c7 call 2f9a461 938->941 943 2f991df-2f991ec 940->943 941->938 945 2f9920a-2f99233 call 2f82727 call 2f9b050 call 2f8101e 943->945 946 2f991ee-2f99208 call 2f9a496 943->946 955 2f995c9-2f997a4 call 2f92d64 call 2f9177a call 2f91701 call 2f91668 call 2f9185b call 2f917e0 call 2f9177a call 2f91701 * 2 call 2f9193a CreateDirectoryA call 2f8134c call 2f98167 call 2f9a4cb call 2f98c01 call 2f9177a * 2 call 2f916b4 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9193a InternetOpenA call 2f9193a InternetOpenA call 2f916b4 call 2f82278 call 2f91668 call 2f91948 call 2f916b4 call 2f843fa call 2f94f8c 945->955 956 2f99239-2f9959c call 2f91668 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9193a call 2f938ba 945->956 946->943 1085 2f997ad-2f998a1 call 2f91668 call 2f8134c call 2f858c4 call 2f948a0 call 2f91668 call 2f8134c call 2f858c4 call 2f945d9 call 2f91668 call 2f8134c call 2f858c4 call 2f947a4 call 2f8134c call 2f951e4 call 2f916b4 call 2f9193a call 2f91668 call 2f84ad5 955->1085 1086 2f997a6 955->1086 1205 2f995be-2f995c4 call 2f91701 956->1205 1206 2f9959e-2f995a7 call 2fa16c8 956->1206 1158 2f998a6-2f99918 call 2f8134c call 2f8f99f 1085->1158 1086->1085 1169 2f9991a-2f9997f call 2f91668 call 2f8134c call 2f858c4 call 2f9497b call 2f8134c call 2f81f1f 1158->1169 1170 2f99985-2f99989 1158->1170 1169->1170 1172 2f9998b-2f999f0 call 2f91668 call 2f8134c call 2f858c4 call 2f944c3 call 2f8134c call 2f94411 1170->1172 1173 2f999f6-2f99a65 call 2f91668 call 2f8134c call 2f858c4 call 2f94ab5 call 2f8134c call 2f96c95 1170->1173 1172->1173 1222 2f99a93-2f99a97 1173->1222 1223 2f99a67-2f99a90 call 2f8134c call 2f96f6b call 2f8134c call 2f98f44 1173->1223 1205->955 1216 2f995ac-2f995b4 1206->1216 1216->1205 1225 2f99a99-2f99aac call 2f8134c call 2f97659 1222->1225 1226 2f99aaf-2f99ab3 1222->1226 1223->1222 1225->1226 1227 2f99acb-2f99acf 1226->1227 1228 2f99ab5-2f99ac8 call 2f8134c call 2f97b07 1226->1228 1234 2f99ad1-2f99ae4 call 2f8134c call 2f97c93 1227->1234 1235 2f99ae7-2f99aea 1227->1235 1228->1227 1234->1235 1236 2f99aec-2f99af3 1235->1236 1237 2f99b06-2f99b0a 1235->1237 1242 2f99b02 1236->1242 1243 2f99af5-2f99b04 Sleep 1236->1243 1245 2f99b0c-2f99b21 call 2f8134c call 2f93160 1237->1245 1246 2f99b24-2f99b28 1237->1246 1242->1237 1243->1235 1245->1246 1254 2f99b2a-2f99b8f call 2f91668 call 2f8134c call 2f858c4 call 2f944c3 call 2f8134c call 2f94411 1246->1254 1255 2f99b95-2f99bd3 call 2f91668 call 2f8134c call 2f858c4 call 2f91701 call 2f8101e 1246->1255 1254->1255 1283 2f99bd9-2f99f3c call 2f91668 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9193a call 2f938ba 1255->1283 1284 2f9a12b-2f9a18f call 2f9193a call 2f93878 call 2f8134c call 2f9a508 call 2f91701 * 2 1255->1284 1453 2f9a120-2f9a126 call 2f91701 1283->1453 1454 2f99f42-2f9a11b call 2fa175f call 2f91668 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f91668 call 2f916b4 * 3 call 2f84e03 call 2f91701 * 2 1283->1454 1312 2f9a195-2f9a1a2 1284->1312 1314 2f9a1c0-2f9a1e6 1312->1314 1315 2f9a1a4-2f9a1be call 2f943df 1312->1315 1318 2f9a1ec-2f9a1f9 1314->1318 1315->1312 1321 2f9a1fb-2f9a215 call 2f96c63 1318->1321 1322 2f9a217-2f9a23d 1318->1322 1321->1318 1325 2f9a243-2f9a250 1322->1325 1328 2f9a26e-2f9a294 1325->1328 1329 2f9a252-2f9a26c call 2f9a43a 1325->1329 1330 2f9a29a-2f9a2a7 1328->1330 1329->1325 1333 2f9a2a9-2f9a2c3 call 2f98c01 1330->1333 1334 2f9a2c5-2f9a2eb 1330->1334 1333->1330 1338 2f9a2f1-2f9a2fe 1334->1338 1341 2f9a32a-2f9a350 1338->1341 1342 2f9a300-2f9a328 call 2f91701 * 2 1338->1342 1346 2f9a356-2f9a363 1341->1346 1342->1338 1349 2f9a38f-2f9a3b0 call 2f98c01 call 2f8131a call 2f91701 1346->1349 1350 2f9a365-2f9a38d call 2f91701 * 2 1346->1350 1350->1346 1453->1284 1454->1453
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F91715: lstrlen.KERNEL32(02F860AC,?,?,02F860AC,02FA5200), ref: 02F9171F
                        • Part of subcall function 02F91715: lstrcpy.KERNEL32(02FA5200,00000000), ref: 02F9176D
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F938BA: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02F938F5
                        • Part of subcall function 02F938BA: Process32First.KERNEL32(?,00000128), ref: 02F93908
                        • Part of subcall function 02F938BA: Process32Next.KERNEL32(?,00000128), ref: 02F9391C
                        • Part of subcall function 02F938BA: StrCmpCA.SHLWAPI(?,?), ref: 02F93930
                        • Part of subcall function 02F938BA: FindCloseChangeNotification.KERNEL32(?), ref: 02F93943
                      • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,?,?,?,02FA5200,00000000), ref: 02F99657
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F9972D
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F99747
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F91948: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 02F91964
                        • Part of subcall function 02F91948: GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02F919A1
                        • Part of subcall function 02F91948: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91A18
                        • Part of subcall function 02F91948: RtlAllocateHeap.NTDLL(00000000), ref: 02F91A1F
                        • Part of subcall function 02F843FA: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F84492
                        • Part of subcall function 02F843FA: StrCmpCA.SHLWAPI(?), ref: 02F844B2
                        • Part of subcall function 02F94F8C: StrCmpCA.SHLWAPI(00000000,02FA8D84), ref: 02F94FB1
                        • Part of subcall function 02F94F8C: ExitProcess.KERNEL32 ref: 02F94FBD
                        • Part of subcall function 02F8F99F: StrCmpCA.SHLWAPI(00000000,?,?), ref: 02F8F9EF
                        • Part of subcall function 02F8F99F: StrCmpCA.SHLWAPI(00000000,?,?), ref: 02F8FA75
                        • Part of subcall function 02F858C4: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F8595F
                        • Part of subcall function 02F858C4: StrCmpCA.SHLWAPI(?), ref: 02F85975
                        • Part of subcall function 02F9497B: strtok_s.MSVCRT ref: 02F949A3
                        • Part of subcall function 02F9497B: strtok_s.MSVCRT ref: 02F94A94
                        • Part of subcall function 02F97B07: lstrcat.KERNEL32(?,00000000), ref: 02F97B40
                        • Part of subcall function 02F97B07: lstrcat.KERNEL32(?), ref: 02F97B5E
                      • Sleep.KERNEL32(000003E8), ref: 02F99AFA
                        • Part of subcall function 02F97C93: memset.MSVCRT ref: 02F97CAA
                        • Part of subcall function 02F97C93: lstrcat.KERNEL32(?,00000000), ref: 02F97CD1
                        • Part of subcall function 02F97C93: lstrcat.KERNEL32(?,02FA97E8), ref: 02F97CEE
                        • Part of subcall function 02F97C93: memset.MSVCRT ref: 02F97D2E
                        • Part of subcall function 02F97C93: lstrcat.KERNEL32(?,00000000), ref: 02F97D55
                        • Part of subcall function 02F97C93: lstrcat.KERNEL32(?,02FA97CC), ref: 02F97D72
                        • Part of subcall function 02F97C93: memset.MSVCRT ref: 02F97DB2
                        • Part of subcall function 02F97C93: lstrcat.KERNEL32(?,00000000), ref: 02F97DD9
                        • Part of subcall function 02F97C93: lstrcat.KERNEL32(?,02FA97AC), ref: 02F97DF6
                        • Part of subcall function 02F84E03: lstrlen.KERNEL32(00000000), ref: 02F84E8B
                        • Part of subcall function 02F84E03: StrCmpCA.SHLWAPI(?,02FA5200,02FA5200,02FA5200,02FA5200), ref: 02F84EEF
                        • Part of subcall function 02F84E03: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F84F17
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$InternetOpenlstrcpy$lstrlenmemset$CreateDirectoryHeapProcessProcess32strtok_s$AllocateChangeCloseExitFindFirstInformationNextNotificationSleepSnapshotToolhelp32VolumeWindows
                      • String ID: 2$2$d$d$d$d$d$d
                      • API String ID: 2038798392-2515486650
                      • Opcode ID: 947e22c2129685afcf28886b8638971ebafcb015995e79c7f0f78b52f49f98ec
                      • Instruction ID: 950e917067ce0d26c76be5a00ba8d845025bde2c555c335bcf9176f95ea9f27f
                      • Opcode Fuzzy Hash: 947e22c2129685afcf28886b8638971ebafcb015995e79c7f0f78b52f49f98ec
                      • Instruction Fuzzy Hash: A5B22E72D441199AEF24FB60CC95EDEB779AB14380F5041F9D60EA2150EF35AB88CFA1

                      Control-flow Graph

                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • RegOpenKeyExA.KERNEL32(?,00000000,00020019,00000000,02FA5200), ref: 02F921DE
                      • RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 02F92259
                      • wsprintfA.USER32 ref: 02F9228B
                      • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,00000000), ref: 02F922AC
                      • RegCloseKey.ADVAPI32(00000000), ref: 02F922BC
                      • RegCloseKey.ADVAPI32(00000000), ref: 02F922C8
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CloseOpenlstrcpy$Enumwsprintf
                      • String ID: ?
                      • API String ID: 3246050789-1684325040
                      • Opcode ID: 10b136e1ebd7e9a157356fa845cef6e9f0827f2c8e945de3964ea6afb3465bfa
                      • Instruction ID: 06d07ca680cc8c392a928597afa9268ed46876ca97f76c599bee82b67e147512
                      • Opcode Fuzzy Hash: 10b136e1ebd7e9a157356fa845cef6e9f0827f2c8e945de3964ea6afb3465bfa
                      • Instruction Fuzzy Hash: 6C71D47290011DABEF65EB60CD45FDA77B9FF08345F4086A5E60AA2050DF71AB89CF90

                      Control-flow Graph

                      APIs
                      • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 02F91964
                      • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02F919A1
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91A18
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F91A1F
                      • wsprintfA.USER32 ref: 02F91A54
                      • lstrcat.KERNEL32(00000000,02FA9270), ref: 02F91A65
                        • Part of subcall function 02F92667: GetCurrentHwProfileA.ADVAPI32(?), ref: 02F92674
                      • lstrlen.KERNEL32(00000000), ref: 02F91A7E
                        • Part of subcall function 02F936CE: malloc.MSVCRT ref: 02F936D5
                      • lstrcat.KERNEL32(00000000,00000000), ref: 02F91AAC
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heaplstrcat$AllocateCurrentDirectoryInformationProcessProfileVolumeWindowslstrcpylstrlenmallocwsprintf
                      • String ID: :$C$\
                      • API String ID: 2966432621-3809124531
                      • Opcode ID: 3e6e1a94b985cd2c640396f920c6f33c7730d6ecb681b97e0d20f196b371e941
                      • Instruction ID: d8a4b998d0c12c829d8bc396310f0470ac887df020920b0c0f88c7b5e40e0d75
                      • Opcode Fuzzy Hash: 3e6e1a94b985cd2c640396f920c6f33c7730d6ecb681b97e0d20f196b371e941
                      • Instruction Fuzzy Hash: 90415E71D0021DAFEF11FBA0DC59BEE7BB9AF08345F1000A5E60AA6190DB759B84CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1653 2f843fa-2f844ba call 2f916b4 call 2f8430f call 2f91668 * 5 call 2f9193a InternetOpenA StrCmpCA 1670 2f844bc 1653->1670 1671 2f844c3-2f844c7 1653->1671 1670->1671 1672 2f844cd-2f8463f call 2f92d64 call 2f917e0 call 2f9177a call 2f91701 * 2 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f917e0 call 2f9177a call 2f91701 * 2 InternetConnectA 1671->1672 1673 2f84a55-2f84ad4 InternetCloseHandle call 2f92bcb * 2 call 2f916b4 call 2f91701 * 9 1671->1673 1672->1673 1748 2f84645-2f84649 1672->1748 1749 2f8464b-2f84655 1748->1749 1750 2f84657 1748->1750 1751 2f84661-2f8468f HttpOpenRequestA 1749->1751 1750->1751 1752 2f84a49-2f84a4f InternetCloseHandle 1751->1752 1753 2f84695-2f84699 1751->1753 1752->1673 1754 2f8469b-2f846ba InternetSetOptionA 1753->1754 1755 2f846c0-2f849b8 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f9185b call 2f9177a call 2f91701 call 2f917e0 call 2f9177a call 2f91701 call 2f91668 call 2f917e0 * 2 call 2f9177a call 2f91701 * 2 call 2f9193a lstrlen call 2f9193a * 2 lstrlen call 2f9193a HttpSendRequestA 1753->1755 1754->1755 1866 2f849bf-2f849e8 InternetReadFile 1755->1866 1867 2f849ea-2f849f1 1866->1867 1868 2f849f3-2f84a44 InternetCloseHandle call 2f91701 1866->1868 1867->1868 1869 2f849f5-2f84a33 call 2f9185b call 2f9177a call 2f91701 1867->1869 1868->1752 1869->1866
                      APIs
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F84387
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F8439B
                        • Part of subcall function 02F8430F: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02F843B9
                        • Part of subcall function 02F8430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 02F843C9
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F84492
                      • StrCmpCA.SHLWAPI(?), ref: 02F844B2
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02F8462C
                      • HttpOpenRequestA.WININET(00000000,?,00000000,00000000,00400100,00000000), ref: 02F84682
                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02F846BA
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                      • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,02FA5200,00000000,?,?,00000000,?,02FA8D60,00000000,?,02FA8D54), ref: 02F8497C
                      • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 02F84998
                      • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 02F849AB
                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 02F849D5
                      • InternetCloseHandle.WININET(00000000), ref: 02F84A38
                      • InternetCloseHandle.WININET(00000000), ref: 02F84A4F
                      • InternetCloseHandle.WININET(00000000), ref: 02F84A58
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Internet$lstrcpy$lstrlen$CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileOptionReadSend
                      • String ID:
                      • API String ID: 3006978581-0
                      • Opcode ID: d9d966a054fe72894472deb394ddb7827469530aafb856abb02d03f2a8e0f81c
                      • Instruction ID: 6d513a3c0b791db42415c51369383db7088355b9b67fe327d262ebe7589d3baf
                      • Opcode Fuzzy Hash: d9d966a054fe72894472deb394ddb7827469530aafb856abb02d03f2a8e0f81c
                      • Instruction Fuzzy Hash: 6012D97291021EAAEF15EB60CDA1FDEB77ABF15381F5001B5E60AA2090DF716B48CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1878 2f98167-2f981e8 call 2f9a3e6 call 2f91715 * 3 call 2f91668 * 6 1898 2f981ed-2f981f4 call 2f82300 1878->1898 1901 2f98262-2f982c5 call 2f82282 call 2f822ac call 2f8134c call 2f97f35 call 2f9177a call 2f91701 call 2f9193a StrCmpCA 1898->1901 1902 2f981f6-2f9825d call 2f82282 call 2f9177a call 2f91701 call 2f822c1 call 2f916b4 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 1898->1902 1932 2f98313-2f98329 call 2f9193a StrCmpCA 1901->1932 1933 2f982c7-2f982f4 call 2f822c1 call 2f916b4 call 2f8134c call 2f97e48 1901->1933 1902->1932 1940 2f98469-2f98506 call 2f9177a call 2f822c1 call 2f9177a call 2f91701 call 2f8230f call 2f9177a call 2f91701 call 2f98c28 call 2f91701 * 6 call 2f98c01 call 2f8131a 1932->1940 1941 2f9832f-2f98336 call 2f82307 1932->1941 1959 2f982f9-2f9830e call 2f9177a call 2f91701 1933->1959 2213 2f98bff-2f98c00 1940->2213 1952 2f9833c-2f98343 call 2f82300 1941->1952 1953 2f98464-2f98521 call 2f9193a StrCmpCA 1941->1953 1965 2f983b3-2f98416 call 2f82297 call 2f822ac call 2f8134c call 2f97f35 call 2f9177a call 2f91701 call 2f9193a StrCmpCA 1952->1965 1966 2f98345-2f983ae call 2f82297 call 2f9177a call 2f91701 call 2f822c1 call 2f82297 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 1952->1966 1968 2f98661-2f986fe call 2f9177a call 2f822c1 call 2f9177a call 2f91701 call 2f8230f call 2f9177a call 2f91701 call 2f98c28 call 2f91701 * 6 call 2f98c01 call 2f8131a 1953->1968 1969 2f98527-2f9852e call 2f82300 1953->1969 1959->1932 1965->1953 2071 2f98418-2f9845f call 2f822c1 call 2f916b4 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 1965->2071 1966->1953 1968->2213 1985 2f9865c-2f98719 call 2f9193a StrCmpCA 1969->1985 1986 2f98534-2f9853b call 2f82300 1969->1986 2012 2f98859-2f988f6 call 2f9177a call 2f822d6 call 2f9177a call 2f91701 call 2f82324 call 2f9177a call 2f91701 call 2f98c28 call 2f91701 * 6 call 2f98c01 call 2f8131a 1985->2012 2013 2f9871f-2f98726 call 2f82300 1985->2013 2003 2f985ab-2f9860e call 2f822d6 call 2f822eb call 2f8134c call 2f97f35 call 2f9177a call 2f91701 call 2f9193a StrCmpCA 1986->2003 2004 2f9853d-2f985a6 call 2f822d6 call 2f9177a call 2f91701 call 2f822d6 * 2 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 1986->2004 2003->1985 2153 2f98610-2f98657 call 2f822d6 call 2f916b4 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 2003->2153 2004->1985 2012->2213 2038 2f9872c-2f98733 call 2f82300 2013->2038 2039 2f98854-2f98911 call 2f9193a StrCmpCA 2013->2039 2061 2f987a3-2f98806 call 2f822d6 call 2f822eb call 2f8134c call 2f97f35 call 2f9177a call 2f91701 call 2f9193a StrCmpCA 2038->2061 2062 2f98735-2f9879e call 2f822d6 call 2f9177a call 2f91701 call 2f822d6 * 2 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 2038->2062 2075 2f98a51-2f98aee call 2f9177a call 2f822d6 call 2f9177a call 2f91701 call 2f82324 call 2f9177a call 2f91701 call 2f98c28 call 2f91701 * 6 call 2f98c01 call 2f8131a 2039->2075 2076 2f98917-2f9891e call 2f82300 2039->2076 2061->2039 2235 2f98808-2f9884f call 2f822d6 call 2f916b4 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 2061->2235 2062->2039 2071->1953 2075->2213 2109 2f98a4c-2f98b09 call 2f9193a StrCmpCA 2076->2109 2110 2f98924-2f9892b call 2f82300 2076->2110 2158 2f98b0b-2f98b16 Sleep 2109->2158 2159 2f98b20-2f98bbd call 2f9177a call 2f822d6 call 2f9177a call 2f91701 call 2f822d6 call 2f9177a call 2f91701 call 2f98c28 call 2f91701 * 6 call 2f98c01 call 2f8131a 2109->2159 2142 2f9899b-2f989fe call 2f822d6 * 2 call 2f8134c call 2f97f35 call 2f9177a call 2f91701 call 2f9193a StrCmpCA 2110->2142 2143 2f9892d-2f98996 call 2f822d6 call 2f9177a call 2f91701 call 2f822d6 * 2 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 2110->2143 2142->2109 2287 2f98a00-2f98a47 call 2f822d6 call 2f916b4 call 2f8134c call 2f97e48 call 2f9177a call 2f91701 2142->2287 2143->2109 2153->1985 2158->1898 2159->2213 2235->2039 2287->2109
                      APIs
                        • Part of subcall function 02F91715: lstrlen.KERNEL32(02F860AC,?,?,02F860AC,02FA5200), ref: 02F9171F
                        • Part of subcall function 02F91715: lstrcpy.KERNEL32(02FA5200,00000000), ref: 02F9176D
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C,00000000), ref: 02F982BD
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C), ref: 02F98321
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F97E48: StrCmpCA.SHLWAPI(00000000,02FA8D8C), ref: 02F97E8B
                        • Part of subcall function 02F97F35: StrCmpCA.SHLWAPI(00000000,02FA8D8C,00000000), ref: 02F97F96
                        • Part of subcall function 02F97F35: lstrlen.KERNEL32(00000000), ref: 02F97FAD
                        • Part of subcall function 02F97F35: StrStrA.SHLWAPI(00000000,00000000), ref: 02F97FDD
                        • Part of subcall function 02F97F35: lstrlen.KERNEL32(00000000), ref: 02F97FF9
                        • Part of subcall function 02F97F35: lstrlen.KERNEL32(00000000), ref: 02F9801F
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C,00000000), ref: 02F9840E
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C), ref: 02F98519
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C,00000000), ref: 02F98606
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C), ref: 02F98711
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C,00000000), ref: 02F987FE
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C), ref: 02F98909
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C), ref: 02F98B01
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpylstrlen
                      • String ID:
                      • API String ID: 2001356338-0
                      • Opcode ID: c80921ed6ca27118ff00362cbf1497eab3d62a60a46ba1d466ade6328ab81d12
                      • Instruction ID: 7c9d3fad819d1debe1ef85fce4b89be83572c8ec1f5956b1e946b99d3e66b36b
                      • Opcode Fuzzy Hash: c80921ed6ca27118ff00362cbf1497eab3d62a60a46ba1d466ade6328ab81d12
                      • Instruction Fuzzy Hash: EE42E072D0010E5AEF14FBB0DD659EEB77AAF113C1F504175DA0AA6090EF35AA48CE92

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2341 2f86312-2f86398 call 2f916b4 call 2f8430f call 2f91668 call 2f9193a InternetOpenA StrCmpCA 2350 2f8639a 2341->2350 2351 2f863a1-2f863a5 2341->2351 2350->2351 2352 2f863ab-2f863cb InternetConnectA 2351->2352 2353 2f86594-2f865b8 call 2f916b4 call 2f91701 * 3 2351->2353 2355 2f8658b-2f8658e InternetCloseHandle 2352->2355 2356 2f863d1-2f863d5 2352->2356 2379 2f865bb-2f865be 2353->2379 2355->2353 2358 2f863e3 2356->2358 2359 2f863d7-2f863e1 2356->2359 2360 2f863ed-2f86417 HttpOpenRequestA 2358->2360 2359->2360 2362 2f8641d-2f86421 2360->2362 2363 2f86582-2f86585 InternetCloseHandle 2360->2363 2365 2f86448-2f86486 HttpSendRequestA HttpQueryInfoA 2362->2365 2366 2f86423-2f86442 InternetSetOptionA 2362->2366 2363->2355 2368 2f86488-2f864b0 call 2f91668 call 2f91701 * 3 2365->2368 2369 2f864b5-2f864d2 call 2f92b90 2365->2369 2366->2365 2368->2379 2377 2f8654f-2f86577 call 2f91668 call 2f91701 * 3 2369->2377 2378 2f864d4-2f864db 2369->2378 2377->2379 2381 2f8654d-2f8657c InternetCloseHandle 2378->2381 2382 2f864dd-2f86506 InternetReadFile 2378->2382 2381->2363 2385 2f86508-2f8650f 2382->2385 2386 2f86511 2382->2386 2385->2386 2390 2f86513-2f8654b call 2f9185b call 2f9177a call 2f91701 2385->2390 2386->2381 2390->2382
                      APIs
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F84387
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F8439B
                        • Part of subcall function 02F8430F: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02F843B9
                        • Part of subcall function 02F8430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 02F843C9
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F86373
                      • StrCmpCA.SHLWAPI(?), ref: 02F86390
                      • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02F863BE
                      • HttpOpenRequestA.WININET(00000000,02FA8D80,?,00000000,00000000,00400100,00000000), ref: 02F8640A
                      • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02F86442
                      • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02F86453
                      • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 02F8647E
                      • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 02F864F3
                      • InternetCloseHandle.WININET(00000000), ref: 02F8657C
                      • InternetCloseHandle.WININET(00000000), ref: 02F86585
                      • InternetCloseHandle.WININET(00000000), ref: 02F8658E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Internet$CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                      • String ID:
                      • API String ID: 3749127164-0
                      • Opcode ID: 76fd2df6ad7bdfd8a983fe606c654921c98872489415edf88f2e7ea5c5991517
                      • Instruction ID: 94694f44675e73d64b4deb21cf077a634f0724b9a68b7bb4f9de91674e5dbbd6
                      • Opcode Fuzzy Hash: 76fd2df6ad7bdfd8a983fe606c654921c98872489415edf88f2e7ea5c5991517
                      • Instruction Fuzzy Hash: F6712D7194021DEFEF25EFA0CC45BDEBBB9FB04341F1040A5E60AAA194DBB16A84CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 2406 2f84239-2f8425c LocalAlloc 2407 2f84265-2f8426b 2406->2407 2408 2f842dd-2f8430e call 2fa17e8 wcslen * 3 2407->2408 2409 2f8426d-2f842db wcslen * 4 strlen wcslen * 2 2407->2409 2409->2407
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: wcslen$AllocLocalstrlen
                      • String ID:
                      • API String ID: 224765317-0
                      • Opcode ID: 68ef355b82286542988cec362b45668d643523796e110a58e149001cd7afdbce
                      • Instruction ID: 71338c153eea9647970555150fbb977f36474a910c655a03b92da83c4d7071d6
                      • Opcode Fuzzy Hash: 68ef355b82286542988cec362b45668d643523796e110a58e149001cd7afdbce
                      • Instruction Fuzzy Hash: CE216FB168424CAFF704EBECDCA6E5E7BE5EF447D0F510045E60996180DAB4AA508E12

                      Control-flow Graph

                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F9208E
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F92095
                      • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 02F920B6
                      • __aulldiv.LIBCMT ref: 02F920CE
                      • __aulldiv.LIBCMT ref: 02F920DC
                      • wsprintfA.USER32 ref: 02F920FF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                      • String ID: @
                      • API String ID: 2774356765-2766056989
                      • Opcode ID: 8de75cd04586127e4528087c793e4526af859eb85762724c7f37b993d0a14144
                      • Instruction ID: 550f798116d68f7b0c75b81009980fa01967490688793ff6ae44906cfd0b32ad
                      • Opcode Fuzzy Hash: 8de75cd04586127e4528087c793e4526af859eb85762724c7f37b993d0a14144
                      • Instruction Fuzzy Hash: DC0108B1D40208BBEF00AFE0CC09BAEBBB9BB04B85F104418F714BA095C7B8A6519F54
                      APIs
                      • ??_U@YAPAXI@Z.MSVCRT ref: 02F84387
                      • ??_U@YAPAXI@Z.MSVCRT ref: 02F8439B
                      • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02F843B9
                      • InternetCrackUrlA.WININET(00000000,00000000), ref: 02F843C9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CrackInternetlstrlen
                      • String ID: <$<
                      • API String ID: 1274457161-213342407
                      • Opcode ID: 67dfed34478a66d728c554d39906b35a79514a011547d1335f4bcd0ad1ae7b29
                      • Instruction ID: 83998020b12b59e98e4d3096cd8ce5435d52ce35062274dafff1196a79b04615
                      • Opcode Fuzzy Hash: 67dfed34478a66d728c554d39906b35a79514a011547d1335f4bcd0ad1ae7b29
                      • Instruction Fuzzy Hash: 8921E871D00219EFDF14DFA8E884BDDBBB4BB08364F108155E669E7290DB705A85CF60
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 02F928C1
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 02F928FA
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F92907
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F9290E
                      • wsprintfA.USER32 ref: 02F9293D
                      • VariantClear.OLEAUT32(?), ref: 02F92955
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: HeapTimeVariant$AllocateClearFileInitProcessSystemwsprintf
                      • String ID:
                      • API String ID: 2682051928-0
                      • Opcode ID: 25dc41e8c21762d4dfa0fbbb0c9b40bdc4686f555efceeb733c7134619fb3f19
                      • Instruction ID: 6ac84732edb40389e059b5735e9321148d1d459d31710207271b619fb5ea3147
                      • Opcode Fuzzy Hash: 25dc41e8c21762d4dfa0fbbb0c9b40bdc4686f555efceeb733c7134619fb3f19
                      • Instruction Fuzzy Hash: 1461B8B1E80208BFEB10DBD4DC55FADBBB9BB08B91F104125FA11BA1D0D7B4A944DB64
                      APIs
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001), ref: 02F9FD9F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: d3f9d8d80f934f854145404bb274e2ce0c4b7689de2b781352d67f735750ed0a
                      • Instruction ID: 22784f1acaac67a2ddcd473ae5712613f1a1341079bf0a0f237f1b26a4f798b3
                      • Opcode Fuzzy Hash: d3f9d8d80f934f854145404bb274e2ce0c4b7689de2b781352d67f735750ed0a
                      • Instruction Fuzzy Hash: 2B61E774E0020ADFEF10CF58CA49BAEBBF1BB04755F258659E515AB292C3B4DA40CF61
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F86312: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F86373
                        • Part of subcall function 02F86312: StrCmpCA.SHLWAPI(?), ref: 02F86390
                        • Part of subcall function 02F86312: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02F863BE
                        • Part of subcall function 02F86312: HttpOpenRequestA.WININET(00000000,02FA8D80,?,00000000,00000000,00400100,00000000), ref: 02F8640A
                        • Part of subcall function 02F86312: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02F86442
                        • Part of subcall function 02F86312: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02F86453
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C,00000000), ref: 02F97F96
                      • lstrlen.KERNEL32(00000000), ref: 02F97FAD
                        • Part of subcall function 02F92FD6: LocalAlloc.KERNEL32(00000040,00000001), ref: 02F92FF2
                      • StrStrA.SHLWAPI(00000000,00000000), ref: 02F97FDD
                      • lstrlen.KERNEL32(00000000), ref: 02F97FF9
                      • lstrlen.KERNEL32(00000000), ref: 02F9801F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSend
                      • String ID:
                      • API String ID: 3240024479-0
                      • Opcode ID: eb062cedc47b3c2228bc1f8d124cfb057adf87990bd81f29efa40c764c8edb0d
                      • Instruction ID: e46bf6f87093fc735f1fc32b6fafcbc90cbc3544703eeba4b30ec3ddb44177e4
                      • Opcode Fuzzy Hash: eb062cedc47b3c2228bc1f8d124cfb057adf87990bd81f29efa40c764c8edb0d
                      • Instruction Fuzzy Hash: 5851DA7190020AAFEF18FF60DD659EE7776BF113C5F604128EA0B961A0DF31AA49CE51
                      APIs
                      • RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 02F92259
                      • wsprintfA.USER32 ref: 02F9228B
                      • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,00000000), ref: 02F922AC
                      • RegCloseKey.ADVAPI32(00000000), ref: 02F922BC
                      • RegCloseKey.ADVAPI32(00000000), ref: 02F922C8
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                      • RegQueryValueExA.KERNEL32(00000000,00000000,000F003F,?,00000400), ref: 02F9231A
                      • lstrlen.KERNEL32(?), ref: 02F9232F
                      • RegQueryValueExA.KERNEL32(00000000,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,02FA8E48), ref: 02F923C6
                      • RegCloseKey.ADVAPI32(00000000), ref: 02F92434
                      • RegCloseKey.ADVAPI32(00000000), ref: 02F92445
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                      • String ID:
                      • API String ID: 3896182533-0
                      • Opcode ID: 8a6637edf35ba5a0aee68b8c783e4f5618b33f94d86ef307c16564af4ec779f8
                      • Instruction ID: 90298f2d43188848238a0de02f522ebbb03d67aa5bd55b26d7c0509e45b3296f
                      • Opcode Fuzzy Hash: 8a6637edf35ba5a0aee68b8c783e4f5618b33f94d86ef307c16564af4ec779f8
                      • Instruction Fuzzy Hash: C821037194012CAFEF64EB10CC44BD9BBB8FF08344F4085E4E649A2090DF709AC98FA0
                      APIs
                      • memset.MSVCRT ref: 02F925F2
                      • RegOpenKeyExA.KERNEL32(80000002,02FA92C4,00000000,00020119,?), ref: 02F92612
                      • RegQueryValueExA.KERNEL32(?,02FA92B8,00000000,00000000,00000000,000000FF), ref: 02F92639
                      • RegCloseKey.ADVAPI32(?), ref: 02F92645
                      • CharToOemA.USER32(00000000,?), ref: 02F92659
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CharCloseOpenQueryValuememset
                      • String ID:
                      • API String ID: 2391366103-0
                      • Opcode ID: 84d26874a1e4eb95e5888200782f90602aef9f1474292e68e3ea39a3cbb6d26d
                      • Instruction ID: dcea43374c5f2dd849d62c767a82bb2d75532607be8fbb58ee43b9b229d6ca83
                      • Opcode Fuzzy Hash: 84d26874a1e4eb95e5888200782f90602aef9f1474292e68e3ea39a3cbb6d26d
                      • Instruction Fuzzy Hash: 4A01F4B594031DBBEB209B50DC4AFDA77BCAB14744F4001E1A749E5091DBF09AD48F51
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91B6F
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F91B76
                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,02F91B06), ref: 02F91B95
                      • RegQueryValueExA.KERNEL32(02F91B06,02FA9280,00000000,00000000,?,000000FF), ref: 02F91BB2
                      • RegCloseKey.ADVAPI32(02F91B06), ref: 02F91BBB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                      • String ID:
                      • API String ID: 3225020163-0
                      • Opcode ID: 72613fce09d43cd4e668089effc5b5fced9c907c34c41c4765e42db3c1b4a2f7
                      • Instruction ID: b8d7d5323bb157be32c1f7f84f5dcf035f4e9d3eeabdd91e5d0f567670faefd7
                      • Opcode Fuzzy Hash: 72613fce09d43cd4e668089effc5b5fced9c907c34c41c4765e42db3c1b4a2f7
                      • Instruction Fuzzy Hash: 37F03771980309BBEB04BFE0DC0AFAEBFB8FB08744F1000A4F701A6095D7B096909B60
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91EC9
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F91ED0
                      • RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,?), ref: 02F91EEF
                      • RegQueryValueExA.KERNEL32(?,00000000,00000000,?,000000FF), ref: 02F91F0D
                      • RegCloseKey.ADVAPI32(?), ref: 02F91F16
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                      • String ID:
                      • API String ID: 3225020163-0
                      • Opcode ID: 4f3518d00a611bdafacb68fc415c6f79fe9d4df803ebef9ebdd9012aa210798f
                      • Instruction ID: 4a7a91a6795cd40e7bc5447c38cfd86387d9e601e0265267b75c530272b3fbe9
                      • Opcode Fuzzy Hash: 4f3518d00a611bdafacb68fc415c6f79fe9d4df803ebef9ebdd9012aa210798f
                      • Instruction Fuzzy Hash: 7FF01775A80309FBEB14BBE0EC0AF9DBFB8FB0C745F104064F601A5195D77196949B20
                      APIs
                      • _MSFOpenExW.MSPDB140-MSVCRT ref: 02F98E6C
                      • CreateThread.KERNEL32(00000000,00000000,Function_00017C65,?,00000000,00000000), ref: 02F98E85
                      • WaitForSingleObject.KERNEL32(?,000003E8), ref: 02F98E96
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CreateObjectOpenSingleThreadWait
                      • String ID:
                      • API String ID: 4234577939-0
                      • Opcode ID: 78b1d5a3bd9b11881289c3e98ee72e6a8c7cd13f34101651422d582419bc4a6b
                      • Instruction ID: f7fd06c9f5b35486c490cc64ea613df9cfdc4ca3be2f50ee5c6d24b17758634d
                      • Opcode Fuzzy Hash: 78b1d5a3bd9b11881289c3e98ee72e6a8c7cd13f34101651422d582419bc4a6b
                      • Instruction Fuzzy Hash: A2316C7194010DAFEF14EFA0CC51BEE7BB9FF04385F548125EA06A6190EB709A4ACF90
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02F92491
                      • Process32First.KERNEL32(?,00000128), ref: 02F924A4
                      • Process32Next.KERNEL32(?,00000128), ref: 02F924B8
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • CloseHandle.KERNEL32(?), ref: 02F92525
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                      • String ID:
                      • API String ID: 1066202413-0
                      • Opcode ID: 9c255fa2cf99e613ef5ed00005c65caa49dff99794aa38c4fbf402e6ae2ab280
                      • Instruction ID: 5c75ef89804f760467436e894cbfd6bba54b56167ccfb092daedc8a6723d18a0
                      • Opcode Fuzzy Hash: 9c255fa2cf99e613ef5ed00005c65caa49dff99794aa38c4fbf402e6ae2ab280
                      • Instruction Fuzzy Hash: FA211A7190011DAAEF15EB50DD64ADEB779AF15385F5041F5A60AB20A0DB319F88CF90
                      APIs
                      • LoadLibraryA.KERNEL32(00000000,?,?), ref: 00978A4D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000976000.00000040.00001000.00020000.00000000.sdmp, Offset: 00976000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_976000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad
                      • String ID: .$.dll
                      • API String ID: 1029625771-979041800
                      • Opcode ID: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                      • Instruction ID: 4f69dd9f66ce5841fa757d4049c8677dcbe05cdc67fb311e3e060848bc89d429
                      • Opcode Fuzzy Hash: f6f06f52cd4a024ca790678b75224790e8b38e6a55f670a1ffdfea5ea75d1fe1
                      • Instruction Fuzzy Hash: EA210A336042859FDB15DF6CC848B7B7BA8AF05320F18816DD949D7A41EB30EC45C750
                      APIs
                      • SysAllocString.OLEAUT32(?), ref: 02F92700
                      • SysFreeString.OLEAUT32(?), ref: 02F92771
                      • SysFreeString.OLEAUT32(00000000), ref: 02F9277A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: String$Free$Alloc
                      • String ID:
                      • API String ID: 986138563-0
                      • Opcode ID: 9dac5744905a80ff998445484e665f22444d383ce9b30e0ff42894bec7b3f464
                      • Instruction ID: 5704cf050caf350b0d6c1050d82f88fae51ddc2487da00425622e3a2f42ed609
                      • Opcode Fuzzy Hash: 9dac5744905a80ff998445484e665f22444d383ce9b30e0ff42894bec7b3f464
                      • Instruction Fuzzy Hash: AA3103B5D00209EFEF05DFA8C849BEEBBB5FB08355F004569EA15A32A0C7759940CFA0
                      APIs
                      • _MSFOpenExW.MSPDB140-MSVCRT ref: 02F98E6C
                      • CreateThread.KERNEL32(00000000,00000000,Function_00017C65,?,00000000,00000000), ref: 02F98E85
                      • WaitForSingleObject.KERNEL32(?,000003E8), ref: 02F98E96
                      • Sleep.KERNEL32(000003E8,?,00000000,?,?), ref: 02F98EA5
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CreateObjectOpenSingleSleepThreadWait
                      • String ID:
                      • API String ID: 1990444757-0
                      • Opcode ID: 39949be7ff8a4b878e96c24a33bbfa01f13689d3536b4c5e55f44cfb1305b89d
                      • Instruction ID: db1db515b45ad9233acb6b815a2cbf2233757275b65b7e787682b335a96c720c
                      • Opcode Fuzzy Hash: 39949be7ff8a4b878e96c24a33bbfa01f13689d3536b4c5e55f44cfb1305b89d
                      • Instruction Fuzzy Hash: E8015771A90109ABFF15FFA0DC51BAD7B69BB057C9F544120E60AA50A1DB709A42CF50
                      APIs
                      • OpenProcess.KERNEL32(00000410,00000000,?), ref: 02F93576
                      • K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 02F93596
                      • CloseHandle.KERNEL32(00000000), ref: 02F9359F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CloseFileHandleModuleNameOpenProcess
                      • String ID:
                      • API String ID: 3183270410-0
                      • Opcode ID: 7d8b7802d37e1bbd87d4f589c6e046fc1b9ee14492e68af191a0d42c957c5b1c
                      • Instruction ID: 3a4c76d734e6de014d210a59d105c5eec72a47c47affe561eb73855db42791df
                      • Opcode Fuzzy Hash: 7d8b7802d37e1bbd87d4f589c6e046fc1b9ee14492e68af191a0d42c957c5b1c
                      • Instruction Fuzzy Hash: F8F0DF7494020DFBEB15EFA0DC0ABDC7BB8BB08748F1444A1A615A61A0D7B0AA84DB50
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F91C63: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91C70
                        • Part of subcall function 02F91C63: RtlAllocateHeap.NTDLL(00000000), ref: 02F91C77
                        • Part of subcall function 02F91C63: GetLocalTime.KERNEL32(?), ref: 02F91C84
                        • Part of subcall function 02F91C63: wsprintfA.USER32 ref: 02F91CB1
                        • Part of subcall function 02F925CA: memset.MSVCRT ref: 02F925F2
                        • Part of subcall function 02F925CA: RegOpenKeyExA.KERNEL32(80000002,02FA92C4,00000000,00020119,?), ref: 02F92612
                        • Part of subcall function 02F925CA: RegQueryValueExA.KERNEL32(?,02FA92B8,00000000,00000000,00000000,000000FF), ref: 02F92639
                        • Part of subcall function 02F925CA: RegCloseKey.ADVAPI32(?), ref: 02F92645
                        • Part of subcall function 02F925CA: CharToOemA.USER32(00000000,?), ref: 02F92659
                        • Part of subcall function 02F92667: GetCurrentHwProfileA.ADVAPI32(?), ref: 02F92674
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F91948: GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 02F91964
                        • Part of subcall function 02F91948: GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02F919A1
                        • Part of subcall function 02F91948: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91A18
                        • Part of subcall function 02F91948: RtlAllocateHeap.NTDLL(00000000), ref: 02F91A1F
                      • GetCurrentProcessId.KERNEL32(00000000,?,02FA96E8,00000000,?,02FA8FE4,00000000,?,00000000,00000000,?,02FA96F0,00000000,?,02FA8E48,00000000), ref: 02F95497
                        • Part of subcall function 02F93563: OpenProcess.KERNEL32(00000410,00000000,?), ref: 02F93576
                        • Part of subcall function 02F93563: K32GetModuleFileNameExA.KERNEL32(00000000,00000000,?,00000104), ref: 02F93596
                        • Part of subcall function 02F93563: CloseHandle.KERNEL32(00000000), ref: 02F9359F
                        • Part of subcall function 02F91ADD: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91AF1
                        • Part of subcall function 02F91ADD: RtlAllocateHeap.NTDLL(00000000), ref: 02F91AF8
                        • Part of subcall function 02F91C21: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91C2D
                        • Part of subcall function 02F91C21: RtlAllocateHeap.NTDLL(00000000), ref: 02F91C34
                        • Part of subcall function 02F91C21: GetComputerNameA.KERNEL32(?,00000104), ref: 02F91C4B
                        • Part of subcall function 02F91BEC: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91BF8
                        • Part of subcall function 02F91BEC: RtlAllocateHeap.NTDLL(00000000), ref: 02F91BFF
                        • Part of subcall function 02F91BEC: GetUserNameA.ADVAPI32(?,00000104), ref: 02F91C16
                        • Part of subcall function 02F9254A: CreateDCA.GDI32(00000000,00000000,00000000), ref: 02F9255C
                        • Part of subcall function 02F9254A: GetDeviceCaps.GDI32(?,00000008), ref: 02F9256A
                        • Part of subcall function 02F9254A: GetDeviceCaps.GDI32(?,0000000A), ref: 02F92578
                        • Part of subcall function 02F9254A: ReleaseDC.USER32(00000000,?), ref: 02F92586
                        • Part of subcall function 02F9254A: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F92593
                        • Part of subcall function 02F9254A: RtlAllocateHeap.NTDLL(00000000), ref: 02F9259A
                        • Part of subcall function 02F9254A: wsprintfA.USER32 ref: 02F925B1
                        • Part of subcall function 02F91D31: GetKeyboardLayoutList.USER32(00000000,00000000,02FA5200), ref: 02F91D59
                        • Part of subcall function 02F91D31: LocalAlloc.KERNEL32(00000040,?), ref: 02F91D71
                        • Part of subcall function 02F91D31: GetKeyboardLayoutList.USER32(?,00000000), ref: 02F91D83
                        • Part of subcall function 02F91D31: GetLocaleInfoA.KERNEL32(00000000,00000002,?,00000200), ref: 02F91DD3
                        • Part of subcall function 02F91D31: LocalFree.KERNEL32(00000000), ref: 02F91E90
                        • Part of subcall function 02F91CBF: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91CCF
                        • Part of subcall function 02F91CBF: RtlAllocateHeap.NTDLL(00000000), ref: 02F91CD6
                        • Part of subcall function 02F91CBF: GetTimeZoneInformation.KERNEL32(?), ref: 02F91CE9
                        • Part of subcall function 02F91EB5: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91EC9
                        • Part of subcall function 02F91EB5: RtlAllocateHeap.NTDLL(00000000), ref: 02F91ED0
                        • Part of subcall function 02F91EB5: RegOpenKeyExA.KERNEL32(80000002,00000000,00020119,?), ref: 02F91EEF
                        • Part of subcall function 02F91EB5: RegQueryValueExA.KERNEL32(?,00000000,00000000,?,000000FF), ref: 02F91F0D
                        • Part of subcall function 02F91EB5: RegCloseKey.ADVAPI32(?), ref: 02F91F16
                        • Part of subcall function 02F91F54: GetLogicalProcessorInformationEx.KERNELBASE(0000FFFF,00000000,00000000), ref: 02F91F87
                        • Part of subcall function 02F91F54: GetLastError.KERNEL32 ref: 02F91F96
                        • Part of subcall function 02F91F21: GetSystemInfo.KERNEL32(?), ref: 02F91F2E
                        • Part of subcall function 02F91F21: wsprintfA.USER32 ref: 02F91F43
                        • Part of subcall function 02F92081: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F9208E
                        • Part of subcall function 02F92081: RtlAllocateHeap.NTDLL(00000000), ref: 02F92095
                        • Part of subcall function 02F92081: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 02F920B6
                        • Part of subcall function 02F92081: __aulldiv.LIBCMT ref: 02F920CE
                        • Part of subcall function 02F92081: __aulldiv.LIBCMT ref: 02F920DC
                        • Part of subcall function 02F92081: wsprintfA.USER32 ref: 02F920FF
                        • Part of subcall function 02F9210D: EnumDisplayDevicesA.USER32(00000000,00000000,000001A8,00000001), ref: 02F92148
                        • Part of subcall function 02F9246A: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02F92491
                        • Part of subcall function 02F9246A: Process32First.KERNEL32(?,00000128), ref: 02F924A4
                        • Part of subcall function 02F9246A: Process32Next.KERNEL32(?,00000128), ref: 02F924B8
                        • Part of subcall function 02F9246A: CloseHandle.KERNEL32(?), ref: 02F92525
                        • Part of subcall function 02F9218B: RegOpenKeyExA.KERNEL32(?,00000000,00020019,00000000,02FA5200), ref: 02F921DE
                        • Part of subcall function 02F9218B: RegEnumKeyExA.KERNEL32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 02F92259
                        • Part of subcall function 02F9218B: wsprintfA.USER32 ref: 02F9228B
                        • Part of subcall function 02F9218B: RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,00000000), ref: 02F922AC
                        • Part of subcall function 02F9218B: RegCloseKey.ADVAPI32(00000000), ref: 02F922BC
                        • Part of subcall function 02F9218B: RegCloseKey.ADVAPI32(00000000), ref: 02F922C8
                      • lstrlen.KERNEL32(00000000,00000000,?,02FA8FE4,00000000,?,00000000,00000000,?,00000000,00000000,?,02FA95F0,00000000,?,02FA8FE4), ref: 02F95DE1
                        • Part of subcall function 02F98DB9: _MSFOpenExW.MSPDB140-MSVCRT ref: 02F98E6C
                        • Part of subcall function 02F98DB9: CreateThread.KERNEL32(00000000,00000000,Function_00017C65,?,00000000,00000000), ref: 02F98E85
                        • Part of subcall function 02F98DB9: WaitForSingleObject.KERNEL32(?,000003E8), ref: 02F98E96
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap$Process$Allocate$CloseOpen$wsprintf$lstrcpy$CreateInformationLocalName$CapsCurrentDeviceEnumHandleInfoKeyboardLayoutListProcess32QueryTimeValue__aulldivlstrcatlstrlen$AllocCharComputerDevicesDirectoryDisplayErrorFileFirstFreeGlobalLastLocaleLogicalMemoryModuleNextObjectProcessorProfileReleaseSingleSnapshotStatusSystemThreadToolhelp32UserVolumeWaitWindowsZonememset
                      • String ID:
                      • API String ID: 1879197162-0
                      • Opcode ID: 04a4e2ae022c6f59a4c65d7b00ac2d5cafbd88ce273c165211c42855516f0c21
                      • Instruction ID: 7728911e717083cda6cee78b1565f1197fb4d8e4b013457b197604afd32ec3ea
                      • Opcode Fuzzy Hash: 04a4e2ae022c6f59a4c65d7b00ac2d5cafbd88ce273c165211c42855516f0c21
                      • Instruction Fuzzy Hash: 40624C7280011EAAEF15FBA0DDA1DDF737EAF14381F5046B9961BA2050EF726B48CE51
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Variant$ClearInit
                      • String ID:
                      • API String ID: 2610073882-0
                      • Opcode ID: e74244d612ae103c80f6a15583500d14d13a042eeb1c80733fea4d31d722bb2f
                      • Instruction ID: 54beaa2dccea1b6523bd8ef92581d167233ddffa24839c6a58738e36a7d700f6
                      • Opcode Fuzzy Hash: e74244d612ae103c80f6a15583500d14d13a042eeb1c80733fea4d31d722bb2f
                      • Instruction Fuzzy Hash: A051C671A84208BFFF15DFA4CC46FADBBB8AB08B91F104165FA11BA1D0C7B1A945CB54
                      APIs
                      • lstrlen.KERNEL32(00000000), ref: 02F98C99
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C,00000000), ref: 02F98D4B
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrlen
                      • String ID:
                      • API String ID: 1659193697-0
                      • Opcode ID: 341a67b8c9a06eb4adbb31614c158a7a5a1b66db813b38ff3ac5fdc7d40963f1
                      • Instruction ID: 64d8754be6b3656ccd715accedb40b28f643f9acc794f194b2bf2c7c802dd8d1
                      • Opcode Fuzzy Hash: 341a67b8c9a06eb4adbb31614c158a7a5a1b66db813b38ff3ac5fdc7d40963f1
                      • Instruction Fuzzy Hash: A6316FB2E10109ABEF04FBA8DD45AAE77B9FF15394F140525E602F7250DB359904CFA1
                      APIs
                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00977687
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000976000.00000040.00001000.00020000.00000000.sdmp, Offset: 00976000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_976000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 3ef942e361509333a6c4df6da77594675f5189c2bdfdb6f3c545f129199b24a5
                      • Instruction ID: 7f3e275149d748aa9f2cc0511eed59af3cd960f59c0fe6014a834788f29ab5de
                      • Opcode Fuzzy Hash: 3ef942e361509333a6c4df6da77594675f5189c2bdfdb6f3c545f129199b24a5
                      • Instruction Fuzzy Hash: 5FB1E373509B02EBDB219AA4CC84BA7F7ECFF45310F108929FA5D96151E731E950CBA2
                      APIs
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F86312: InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F86373
                        • Part of subcall function 02F86312: StrCmpCA.SHLWAPI(?), ref: 02F86390
                        • Part of subcall function 02F86312: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 02F863BE
                        • Part of subcall function 02F86312: HttpOpenRequestA.WININET(00000000,02FA8D80,?,00000000,00000000,00400100,00000000), ref: 02F8640A
                        • Part of subcall function 02F86312: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 02F86442
                        • Part of subcall function 02F86312: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 02F86453
                      • StrCmpCA.SHLWAPI(00000000,02FA8D8C), ref: 02F97E8B
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                      • String ID:
                      • API String ID: 3287882509-0
                      • Opcode ID: 03a928425593444dc5e8731505fc633512705c9837c7d3cfe101a46b88648e10
                      • Instruction ID: acc3c033806283fe4d70898be5bf5d00665ec1ab14d2841ba837556246d448ba
                      • Opcode Fuzzy Hash: 03a928425593444dc5e8731505fc633512705c9837c7d3cfe101a46b88648e10
                      • Instruction Fuzzy Hash: DF119E7195010A9AEF14FF60DC659DE777AAF10385F504134EA1B96191EF31EB08CF81
                      APIs
                      • GetCurrentHwProfileA.ADVAPI32(?), ref: 02F92674
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CurrentProfilelstrcpy
                      • String ID:
                      • API String ID: 2831436455-0
                      • Opcode ID: 03f35fcdbe09fba07380814a3432bd4c07bb40beaa6873aac2f4d58fb87eff28
                      • Instruction ID: 179c6591752678e71e268ad96bd737ee1ce6c691d1bd990afba92bb5c520d43b
                      • Opcode Fuzzy Hash: 03f35fcdbe09fba07380814a3432bd4c07bb40beaa6873aac2f4d58fb87eff28
                      • Instruction Fuzzy Hash: 60E09270A00209AFEF14EEA8D895E9D7BADAB047C8F448024AA099B140DB70E959CF90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Find$Filememset$CloseFirstNextwsprintf
                      • String ID:
                      • API String ID: 1738266208-0
                      • Opcode ID: 78da328da91ac1b3c55f4ee2e41ff6cb955fcddc2bd22d92d4310c10d7be1b79
                      • Instruction ID: 7498dd62c5e9215689db6f83e5404815d69d1dad05e7f9ada58d2f0a1b9a119a
                      • Opcode Fuzzy Hash: 78da328da91ac1b3c55f4ee2e41ff6cb955fcddc2bd22d92d4310c10d7be1b79
                      • Instruction Fuzzy Hash: CBD1FDB2D4021EAEEF25EB60CC55EEA77BDAB04385F4040B5E709E6050EB719B98CF51
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • FindFirstFileA.KERNEL32(00000000,?,02FA5200,02FA5200,00000000,?,?,?,02FA8F3C,02FA5200), ref: 02F8A045
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F8A0A0
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F8A0B6
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F8AB2C
                      • FindClose.KERNEL32(000000FF), ref: 02F8AB3D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID:
                      • API String ID: 3334442632-0
                      • Opcode ID: d8fda1eef01559c2f1f8ea39c6aaafba52aa7e60914530a22013149b91dbd46c
                      • Instruction ID: ecee1690c56e9fa2b93f491fe9fe45870c4350c8d8d32666189c0833838f8b67
                      • Opcode Fuzzy Hash: d8fda1eef01559c2f1f8ea39c6aaafba52aa7e60914530a22013149b91dbd46c
                      • Instruction Fuzzy Hash: BF52FC7290011AAAEF25FB70DC65EEE777EAB54380F4041B5E60EE2050EE329B49CF51
                      APIs
                      • wsprintfA.USER32 ref: 02F977EB
                      • FindFirstFileA.KERNEL32(?,?), ref: 02F97802
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F97830
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F97846
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F97AE3
                      • FindClose.KERNEL32(000000FF), ref: 02F97AF7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID:
                      • API String ID: 180737720-0
                      • Opcode ID: 5add10353a81d3aa0d1783e564b3dbcc6099adc533e2bc39dee055d65af23266
                      • Instruction ID: 86a4c750838073e590e08609b0b6bd1be2c3188043d7934c3f1d1a01f1aa35fa
                      • Opcode Fuzzy Hash: 5add10353a81d3aa0d1783e564b3dbcc6099adc533e2bc39dee055d65af23266
                      • Instruction Fuzzy Hash: 4C811F7191021DABEF14FBA0DC54EEA77BDBB08381F5445A5E64AE2050EF31DA84CFA1
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 02F9739D
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F973A4
                      • wsprintfA.USER32 ref: 02F973BF
                      • FindFirstFileA.KERNEL32(?,?), ref: 02F973D6
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F97404
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F9741A
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F9756F
                      • FindClose.KERNEL32(000000FF), ref: 02F97583
                      • lstrcat.KERNEL32(?,?), ref: 02F975A7
                      • lstrcat.KERNEL32(?), ref: 02F975BA
                      • lstrlen.KERNEL32(?), ref: 02F975C6
                      • lstrlen.KERNEL32(?), ref: 02F975D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                      • String ID:
                      • API String ID: 671575355-0
                      • Opcode ID: 86e0bdba393bd34158e80640b03069dbb2619aad6b8450c0660cc700bcc32a0b
                      • Instruction ID: 3f0c4c911263c79f6d9cd88ffa72b74518bc4d5967c464321753dad889856d51
                      • Opcode Fuzzy Hash: 86e0bdba393bd34158e80640b03069dbb2619aad6b8450c0660cc700bcc32a0b
                      • Instruction Fuzzy Hash: 0F610BB194021DABEF14FB60CD99EEE777DBB18381F4044A5E60AE2050EB719B84CF61
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: memset
                      • String ID:
                      • API String ID: 2221118986-0
                      • Opcode ID: 7b06508a9bd92b92a6cb8704679f54d0d3e3c65b80071c217878b0d52a7fd9a6
                      • Instruction ID: cbc1d37a05e7d5d45241875b631fd893059850182bf2a29ebdc0d5a2846165f6
                      • Opcode Fuzzy Hash: 7b06508a9bd92b92a6cb8704679f54d0d3e3c65b80071c217878b0d52a7fd9a6
                      • Instruction Fuzzy Hash: 7961D272D50208BBEF05AFA0DC49BEDBBB9FF08351F104064F605A60A4DB719A95DF60
                      APIs
                      • memset.MSVCRT ref: 02F90A4F
                      • memset.MSVCRT ref: 02F90A5F
                      • CreateProcessA.KERNEL32(?,?,00000000,00000000,00000001,00000004,00000000,00000000,?,?), ref: 02F90A81
                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 02F90AA7
                      • GetThreadContext.KERNEL32(?,?), ref: 02F90ABF
                      • ReadProcessMemory.KERNEL32(?,?,00000000,00000004,00000000), ref: 02F90AE5
                      • VirtualAllocEx.KERNEL32(?,?,?,00003000,00000040), ref: 02F90B01
                      • ResumeThread.KERNEL32(?), ref: 02F90B13
                      • WriteProcessMemory.KERNEL32(?,00000000,00000000,?,00000000), ref: 02F90B3B
                      • WriteProcessMemory.KERNEL32(?,00000000,?,00000000,00000000), ref: 02F90B92
                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 02F90BB5
                      • SetThreadContext.KERNEL32(?,?), ref: 02F90BD3
                      • ResumeThread.KERNEL32(?), ref: 02F90BDC
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Process$MemoryThread$Write$AllocContextResumeVirtualmemset$CreateRead
                      • String ID:
                      • API String ID: 619895632-0
                      • Opcode ID: 885beae74daac6c8f99798fd4e7bb164b720a1f1f6cd81853e8fc5de052cc56a
                      • Instruction ID: cb3af06b11b819628bac3c75b7b86a747d5fcd1bde269ced772cf2fce9776bb3
                      • Opcode Fuzzy Hash: 885beae74daac6c8f99798fd4e7bb164b720a1f1f6cd81853e8fc5de052cc56a
                      • Instruction Fuzzy Hash: 6E61C075A40208EFEF04DF98C845FEDBBB5BF08315F1080A4E615AB2A1D771AA90DF24
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,02FA51E8,?,?,?,02FA51E8,?,?,00000000,?,00000000), ref: 02F81696
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F816E6
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F816FC
                      • FindFirstFileA.KERNEL32(00000000,?,?,?,?,02FA51E8,?,?,?,02FA51E8,?,?,?,02FA51E8,?,?), ref: 02F81802
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F92F4C: GetFileAttributesA.KERNEL32(00000000,?,02F81C1A,?,?,?,02FA5200), ref: 02F92F5B
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02F81DEC
                      • DeleteFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 02F81AE7
                        • Part of subcall function 02F98DB9: _MSFOpenExW.MSPDB140-MSVCRT ref: 02F98E6C
                        • Part of subcall function 02F98DB9: CreateThread.KERNEL32(00000000,00000000,Function_00017C65,?,00000000,00000000), ref: 02F98E85
                        • Part of subcall function 02F98DB9: WaitForSingleObject.KERNEL32(?,000003E8), ref: 02F98E96
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02F81A62
                        • Part of subcall function 02F87CDF: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02F87D05
                        • Part of subcall function 02F87CDF: GetFileSizeEx.KERNEL32(000000FF,?), ref: 02F87D29
                        • Part of subcall function 02F87CDF: LocalAlloc.KERNEL32(00000040,?), ref: 02F87D48
                        • Part of subcall function 02F87CDF: ReadFile.KERNEL32(000000FF,00000000,?,02F81270,00000000), ref: 02F87D6E
                        • Part of subcall function 02F87CDF: LocalFree.KERNEL32(00000000), ref: 02F87DA0
                        • Part of subcall function 02F87CDF: CloseHandle.KERNEL32(000000FF), ref: 02F87DA9
                      • FindNextFileA.KERNEL32(000000FF,?,?,?,?,?,?,?), ref: 02F81B34
                      • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 02F81B48
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F92D64: GetSystemTime.KERNEL32(?,02FA5200,?,?,?,?,?,?,?,?,?,02F84F38,?,00000014), ref: 02F92D8A
                      • DeleteFileA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,02FA5200), ref: 02F81E71
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F81EC6
                      • FindClose.KERNEL32(000000FF), ref: 02F81ED7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: File$Find$lstrcpy$Close$CopyCreateDeleteFirstLocalNextlstrcat$AllocAttributesFreeHandleObjectOpenReadSingleSizeSystemThreadTimeWaitlstrlen
                      • String ID:
                      • API String ID: 3942515123-0
                      • Opcode ID: 47eb75b00ad45897c2f528fe822f88c8abfd758b61329773905e244b3c10b1fb
                      • Instruction ID: 1f55774e8c091896dfc4623240266033e858a0ff850293d470c18fbba003cb5d
                      • Opcode Fuzzy Hash: 47eb75b00ad45897c2f528fe822f88c8abfd758b61329773905e244b3c10b1fb
                      • Instruction Fuzzy Hash: 9A52787190011E9AEF15FB60CDA5EEF737AAB15381F5041B9D60EA2090EF329B89CF51
                      APIs
                      • wsprintfA.USER32 ref: 02F96D98
                      • FindFirstFileA.KERNEL32(?,?), ref: 02F96DAF
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F96DDD
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F96DF3
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F96F36
                      • FindClose.KERNEL32(000000FF), ref: 02F96F4A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID:
                      • API String ID: 180737720-0
                      • Opcode ID: 2270c89887d4047094eb62dff823d9af23ff753b11a9fcaaf69058bf8d982484
                      • Instruction ID: 8e7a89da05d2374d3d2f2dd4c16cbd7b4d894ae361c5301fc2643e9b08d0881a
                      • Opcode Fuzzy Hash: 2270c89887d4047094eb62dff823d9af23ff753b11a9fcaaf69058bf8d982484
                      • Instruction Fuzzy Hash: 414119B2D4421DBBDF10FBB0DC49EDA7BBDBB08344F4445A5A65AE2040EB75D6888F60
                      APIs
                      • wsprintfA.USER32 ref: 02F8D6AE
                      • FindFirstFileA.KERNEL32(?,?), ref: 02F8D6C5
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F8D71B
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F8D731
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F8DC3C
                      • FindClose.KERNEL32(000000FF), ref: 02F8DC50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Find$File$CloseFirstNextwsprintf
                      • String ID:
                      • API String ID: 180737720-0
                      • Opcode ID: 540bddbc67b5e69e6ab0212ec099b51c4d00ec2758bd4b09bda998b0fd1ea0c7
                      • Instruction ID: 2c7d0d50195290f94282b083155cbc75482adf70a02f015ff3f22a9fb349c8c2
                      • Opcode Fuzzy Hash: 540bddbc67b5e69e6ab0212ec099b51c4d00ec2758bd4b09bda998b0fd1ea0c7
                      • Instruction Fuzzy Hash: F9E19C7290121E9AFF55FB60CC95EEF7379AF15381F4001B5E60EA2091EE319B89CE91
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,02FA8F3C,02FA5200), ref: 02F8BD03
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F8BD4E
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F8BD64
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F8BFF5
                      • FindClose.KERNEL32(000000FF), ref: 02F8C006
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID:
                      • API String ID: 3334442632-0
                      • Opcode ID: 7798353706b8e0956300d0b18ad0a951d5e85154f1f952e359970ae2d0ddf2bb
                      • Instruction ID: 703b373e7e1fbc3de024825924390e92c196fe7f9c7436ce032cb07f35c167e1
                      • Opcode Fuzzy Hash: 7798353706b8e0956300d0b18ad0a951d5e85154f1f952e359970ae2d0ddf2bb
                      • Instruction Fuzzy Hash: 5C910A72D001099AEF24FAB0DC59AEEB7BEAB54384F404175EA1AD6050EF35DB488F91
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,02FA8F3C,02FA5200), ref: 02F8E083
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F8E0CE
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F8E0E4
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F8E3F8
                      • FindClose.KERNEL32(000000FF), ref: 02F8E409
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                      • String ID:
                      • API String ID: 3334442632-0
                      • Opcode ID: 9b9039b0e298fa3caef0a1cc97653ddef961810c9039968bd2a28e9f7a24f6fe
                      • Instruction ID: 2d87da8b677c6cf477781aa5b235cc413b82a3dcea46cba347470505b160a0b5
                      • Opcode Fuzzy Hash: 9b9039b0e298fa3caef0a1cc97653ddef961810c9039968bd2a28e9f7a24f6fe
                      • Instruction Fuzzy Hash: 7DB11B72D0011A9AEF24FB70DC95AEEB37AAB55381F4041B5E60ED6090EE319B49CF91
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,02FA5244,02FA5200), ref: 02F8C724
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F8C774
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F8C78A
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F8CE7B
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                      • String ID:
                      • API String ID: 433455689-0
                      • Opcode ID: ea79e75f23378f9009f28c7675272172c014e4b906a2bed78c1c0d48f7034a6e
                      • Instruction ID: 5af2572920d59f2e317447bdb5e2a01ffff80d8a4c6eebe00f901cab601b2779
                      • Opcode Fuzzy Hash: ea79e75f23378f9009f28c7675272172c014e4b906a2bed78c1c0d48f7034a6e
                      • Instruction Fuzzy Hash: 9112AB7194021E9AEF15FB60CCA5EEE737AAF55381F5001B5D60EA2090EF319B89CF91
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • FindFirstFileA.KERNEL32(00000000,?,00000000,?,02FA5244,02FA5200), ref: 02F8C087
                      • StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F8C0D7
                      • StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F8C0ED
                      • FindNextFileA.KERNEL32(000000FF,?), ref: 02F8C66C
                      • FindClose.KERNEL32(000000FF), ref: 02F8C67D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                      • String ID:
                      • API String ID: 2325840235-0
                      • Opcode ID: c1a51ae7ea1c835586453056ae9a32ce19772df2b0f673794c5fe4d620fff9b2
                      • Instruction ID: 6da0084ac9c0c26ea050cda231025f8899caee499931f955b3af28a99b9bbd21
                      • Opcode Fuzzy Hash: c1a51ae7ea1c835586453056ae9a32ce19772df2b0f673794c5fe4d620fff9b2
                      • Instruction Fuzzy Hash: 3FF1497191411E9AEF15FB60CDA4EEFB379AB15381F5001B6D60EA2090EE329B89CE51
                      APIs
                      • memset.MSVCRT ref: 02F8ABB0
                      • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 02F8ABCC
                      • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 02F8ABD6
                      • memcpy.MSVCRT ref: 02F8AC63
                      • lstrcat.KERNEL32(?,02FA5200), ref: 02F8AC92
                      • lstrcat.KERNEL32(?,02FA5200), ref: 02F8ACA5
                      • lstrcat.KERNEL32(?,02FA5200), ref: 02F8ACC2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                      • String ID:
                      • API String ID: 1498829745-0
                      • Opcode ID: 21054524c48f4f99f066ca17f9e53c1cf8abb533bafc51ec6f558a5f552d501d
                      • Instruction ID: e835ae7997079478ac38ad9d55af675ad627abcd343c3be6031f7315a89cf274
                      • Opcode Fuzzy Hash: 21054524c48f4f99f066ca17f9e53c1cf8abb533bafc51ec6f558a5f552d501d
                      • Instruction Fuzzy Hash: 9131EA71D4421EAFDB10AB90DD49BEEBBB8FB08385F5041B5E605A2180D7749A84CFA1
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • GetKeyboardLayoutList.USER32(00000000,00000000,02FA5200), ref: 02F91D59
                      • LocalAlloc.KERNEL32(00000040,?), ref: 02F91D71
                      • GetKeyboardLayoutList.USER32(?,00000000), ref: 02F91D83
                      • GetLocaleInfoA.KERNEL32(00000000,00000002,?,00000200), ref: 02F91DD3
                      • LocalFree.KERNEL32(00000000), ref: 02F91E90
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                      • String ID:
                      • API String ID: 3090951853-0
                      • Opcode ID: 59192ad7be816ae3cd251e6c1bce98c2f9ea908cad5acdb1ddcceecc4d1d1c47
                      • Instruction ID: f48a2f61178d5b8fbd59484faf356b72a53765930d1f1cdbddedf851bdfebd77
                      • Opcode Fuzzy Hash: 59192ad7be816ae3cd251e6c1bce98c2f9ea908cad5acdb1ddcceecc4d1d1c47
                      • Instruction Fuzzy Hash: D541177598021DABEF24EB50DC88BEEB3B9EB14341F2041E5E61AA2091DB706F85CF10
                      APIs
                      • IsDebuggerPresent.KERNEL32 ref: 02FA2C26
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 02FA2C3B
                      • UnhandledExceptionFilter.KERNEL32(02FAC0CC), ref: 02FA2C46
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 02FA2C62
                      • TerminateProcess.KERNEL32(00000000), ref: 02FA2C69
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                      • String ID:
                      • API String ID: 2579439406-0
                      • Opcode ID: 0ec93da08bcc6704215436bd1bec9e6e54a9cf6b95d89eabd8a7ed91fda6061a
                      • Instruction ID: 82a5c20810f7fee26320c2a4759da95181edc54b8450d7ad3698474c52a660fe
                      • Opcode Fuzzy Hash: 0ec93da08bcc6704215436bd1bec9e6e54a9cf6b95d89eabd8a7ed91fda6061a
                      • Instruction Fuzzy Hash: 3A2125B8961309CFDB09EF64F0956447FB4FB0C790F508909EA0987248E7B199C2CFA5
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 02F937F8
                      • Process32First.KERNEL32(?,00000128), ref: 02F9380B
                      • Process32Next.KERNEL32(?,00000128), ref: 02F9381F
                      • StrCmpCA.SHLWAPI(?,02F9136D), ref: 02F93833
                      • CloseHandle.KERNEL32(?), ref: 02F93850
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                      • String ID:
                      • API String ID: 420147892-0
                      • Opcode ID: 93dc2a95adb037c7a2ff44d3e8e4947e015296cda9e2dd296dad5f7a1589e0b4
                      • Instruction ID: 1a87aa1ac41829aed49339503030aa5e5f88f66cf57f33277c0681e6a8f358af
                      • Opcode Fuzzy Hash: 93dc2a95adb037c7a2ff44d3e8e4947e015296cda9e2dd296dad5f7a1589e0b4
                      • Instruction Fuzzy Hash: B1115E72E40219EFEF11DF95C849FEEBBB8FB08795F0042A9E605A2190D7349A40CB60
                      APIs
                      • CryptBinaryToStringA.CRYPT32(00000000,02F84E7F,40000001,00000000,00000000), ref: 02F9304A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: BinaryCryptString
                      • String ID:
                      • API String ID: 80407269-0
                      • Opcode ID: 1a4e72ee3b89cf55d6dcc57c03a876b036d9fdea6c514b3dba24075f89d24b55
                      • Instruction ID: eb0557c7f59e0cd2405df873d3eddf2f22b8735d8e40399113e336f5402a0023
                      • Opcode Fuzzy Hash: 1a4e72ee3b89cf55d6dcc57c03a876b036d9fdea6c514b3dba24075f89d24b55
                      • Instruction Fuzzy Hash: B611D736614208FFEF41AF64DC44BA93BA6FF49788F0044A0FA158B171C77699A0EB20
                      APIs
                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,02F86095,00000000,00000000), ref: 02F87DE6
                      • LocalAlloc.KERNEL32(00000040,02F86095,?,?,02F86095,00000000,?), ref: 02F87DF7
                      • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,02F86095,00000000,00000000), ref: 02F87E1D
                      • LocalFree.KERNEL32(00000000,?,?,02F86095,00000000,?), ref: 02F87E31
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: BinaryCryptLocalString$AllocFree
                      • String ID:
                      • API String ID: 4291131564-0
                      • Opcode ID: f368554a33aaa2e84a87de841b830d7121920f485ea272b71e179f07293c8547
                      • Instruction ID: ed543c8398c8f6cb3a9f7ca9be59b1a8f5aa8f0b219cbead35cf2760712ec781
                      • Opcode Fuzzy Hash: f368554a33aaa2e84a87de841b830d7121920f485ea272b71e179f07293c8547
                      • Instruction Fuzzy Hash: 6111DD35290308FFEB12AF54CC46B997BB1FB08755F208064FA14AF2E0C3B1AA50DB18
                      APIs
                      • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 02F87E65
                      • LocalAlloc.KERNEL32(00000040,00000000), ref: 02F87E83
                      • LocalFree.KERNEL32(?), ref: 02F87EAB
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Local$AllocCryptDataFreeUnprotect
                      • String ID:
                      • API String ID: 2068576380-0
                      • Opcode ID: 39651999e1d833c7a6e2938292c8e67647c59726b6ee513882c8ab50f06b8129
                      • Instruction ID: 5deef2d67c2b52f7adcf88cd3e659875df576fcc78d779cfefd156897204c1f9
                      • Opcode Fuzzy Hash: 39651999e1d833c7a6e2938292c8e67647c59726b6ee513882c8ab50f06b8129
                      • Instruction Fuzzy Hash: D4019375900209EFCB05EF98D945A9EBBF5FF09304F500064F901AB2A0D7309E50DF61
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: K
                      • API String ID: 0-856455061
                      • Opcode ID: 1a641afb7448ea8624540d959037065100805b0cb9cf6c6ba227a397cac0e44b
                      • Instruction ID: 7e5d77bc767c76e833b674ada3b56218810838ca361edaeb419b40b6fa799dee
                      • Opcode Fuzzy Hash: 1a641afb7448ea8624540d959037065100805b0cb9cf6c6ba227a397cac0e44b
                      • Instruction Fuzzy Hash: B322D131950289AFDB01CF98CC46EED7BB5EF44310F0880A1FD58DA292D276DB68DB95
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: K
                      • API String ID: 0-856455061
                      • Opcode ID: 1a641afb7448ea8624540d959037065100805b0cb9cf6c6ba227a397cac0e44b
                      • Instruction ID: aa0ab1e66d5205d6580fdfd371cb55786a4f2b13f54ce1c2c0468aab528c041a
                      • Opcode Fuzzy Hash: 1a641afb7448ea8624540d959037065100805b0cb9cf6c6ba227a397cac0e44b
                      • Instruction Fuzzy Hash: A122E131550289AFDB01CF98CC46EED7BB5EF44310F4880A0FD58DA292D276DB68DB95
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: K
                      • API String ID: 0-856455061
                      • Opcode ID: 8f5226f9d6fe93ad6a604e25ba4a52b60e503e1c5ce3399b4d435a56d3f081ad
                      • Instruction ID: d9c5c55c1cb6ae9f3ee3c942f760b410386247b005b50ee500ab987dfe18a826
                      • Opcode Fuzzy Hash: 8f5226f9d6fe93ad6a604e25ba4a52b60e503e1c5ce3399b4d435a56d3f081ad
                      • Instruction Fuzzy Hash: B1E1E131950289AFDB01CF98DC46EED7BB5EF40310F0880A1FD58DA292D276DB68DB95
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: K
                      • API String ID: 0-856455061
                      • Opcode ID: 8f5226f9d6fe93ad6a604e25ba4a52b60e503e1c5ce3399b4d435a56d3f081ad
                      • Instruction ID: d0f6ee12d1bf9b18424e99edd154577b6061b9a26987bd8163f5ae16754914ab
                      • Opcode Fuzzy Hash: 8f5226f9d6fe93ad6a604e25ba4a52b60e503e1c5ce3399b4d435a56d3f081ad
                      • Instruction Fuzzy Hash: 3BE1D031950289AFDB01CF98CC46EED7BB5EF44310F0480A1FD58DA2A2D276DB68DB95
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00022D8B), ref: 02FA3DD2
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: a5c68cc7523b685de3f9c173338211e94e9f14d678d8d0501b3ca339815f117f
                      • Instruction ID: 6f45bcba469e1d30eebff6b06664d93f649ac5df7e71346a2ae8121fd6367031
                      • Opcode Fuzzy Hash: a5c68cc7523b685de3f9c173338211e94e9f14d678d8d0501b3ca339815f117f
                      • Instruction Fuzzy Hash: D99002F0A91119C7E60017B05C5A509BA946A48982793C8947503C4105DB61A01056A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID: K
                      • API String ID: 0-856455061
                      • Opcode ID: b4552a968a542d6df4a9543d6a16f7554eb957ba9cd019870136d631622b6582
                      • Instruction ID: a62eedf10f362cc4930d7085e293b7856415292743221bc11f3930880cd6faf5
                      • Opcode Fuzzy Hash: b4552a968a542d6df4a9543d6a16f7554eb957ba9cd019870136d631622b6582
                      • Instruction Fuzzy Hash: D561C03156028DBFDB01CF98DC46AED7BB5EF44310F0480A0F954DA292D276DA68DB55
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: K
                      • API String ID: 0-856455061
                      • Opcode ID: b4552a968a542d6df4a9543d6a16f7554eb957ba9cd019870136d631622b6582
                      • Instruction ID: a62eedf10f362cc4930d7085e293b7856415292743221bc11f3930880cd6faf5
                      • Opcode Fuzzy Hash: b4552a968a542d6df4a9543d6a16f7554eb957ba9cd019870136d631622b6582
                      • Instruction Fuzzy Hash: D561C03156028DBFDB01CF98DC46AED7BB5EF44310F0480A0F954DA292D276DA68DB55
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 309e5b8e83620cb7c680a11bf899644b121f563c7fabc11498b565a3ef665174
                      • Instruction ID: c04dc7e6796092eabb6bda206bd51d3e14a40980782c4282a45950e089397b50
                      • Opcode Fuzzy Hash: 309e5b8e83620cb7c680a11bf899644b121f563c7fabc11498b565a3ef665174
                      • Instruction Fuzzy Hash: C9C14776E153388BEB19CEB9CC943AE7A62A7C0304F95D22CD546EF289DF7509464BC0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 5ede5e5d2c40fe7a91c30d488d6fd4ec8691e71f10d082f39faab89df7caed5e
                      • Instruction ID: 7d09ef2af978e680a97d9c5ee25790082d54878e44a57185aed67c50cb1a1d12
                      • Opcode Fuzzy Hash: 5ede5e5d2c40fe7a91c30d488d6fd4ec8691e71f10d082f39faab89df7caed5e
                      • Instruction Fuzzy Hash: 7D517471514589AFCB85DF2CD491AA93BE0EB09391F14C52AFD6ACF280C638E6A0DF54
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8d0efc927fa52fff963f3018c9134edacac6edabb7d359014e56f6bce97f91fe
                      • Instruction ID: c4f2e5f3cb0c0c2f0772f4603cf16fb09193b98d99262acac84df3d152fa94af
                      • Opcode Fuzzy Hash: 8d0efc927fa52fff963f3018c9134edacac6edabb7d359014e56f6bce97f91fe
                      • Instruction Fuzzy Hash: 23519E30514189AFCB59CF28D891AA93BE0EB09351F54C52AFD6ECF280C739E6A1DF44
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                      • Instruction ID: c2716a26a242b94d8919bdb171355d1b27cbecb5cc2a29258cd8f614bb8568a2
                      • Opcode Fuzzy Hash: b09967ac5482500bc099009dc95111bd7cc7545dcabcf40ba633cd1a509d9f95
                      • Instruction Fuzzy Hash: 16517374E00209DFCB08CF98C590AAEB7B2FF88314F248599D815AB355D735AE91DFA4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                      • Instruction ID: 1c54e359f7c83c5507ab159f06470ddd549ee51ede59da69f36d76240a68c303
                      • Opcode Fuzzy Hash: 4e64317625e06953a0030493f718403388be9115d8c6a0e5777c3d8d6dbedd3d
                      • Instruction Fuzzy Hash: 70317374E00119DFCB08CF98C590AAEBBB1FF48314F248599D815AB345D735AE86DF94
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                      • Instruction ID: 61770d9b224a640a8f9ac33a331c52e83da2315b26e8643c3822bb8b8d41844e
                      • Opcode Fuzzy Hash: 2f432f6d4d57ddd5edf10f0a55197208a6667e030cc273150dee4b63bd6a15e3
                      • Instruction Fuzzy Hash: 6C019234A11208EBCB54DF98C184AACB7B6BB84314F608599D9099B785C730AE45DB40
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9f96b6833605b0715f9484dbe982297a654c379e9a96f2571680b3f7b5e8fa17
                      • Instruction ID: 43cdf4ecb647160fda175e5076d83385583e07dd488e496ff266cef725db0fb4
                      • Opcode Fuzzy Hash: 9f96b6833605b0715f9484dbe982297a654c379e9a96f2571680b3f7b5e8fa17
                      • Instruction Fuzzy Hash: 7ED092B1509719AFDB288F5AE480896FBE8EE48274750C42EE8AE97700C231A8408B90
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f8d911352b7be11e8ef3f8d43dc69cd37138e10f06c97852b63a715cd4b250d5
                      • Instruction ID: d256f1c99479b207678580fcb63197705f640815169115519c5f26934de16b0c
                      • Opcode Fuzzy Hash: f8d911352b7be11e8ef3f8d43dc69cd37138e10f06c97852b63a715cd4b250d5
                      • Instruction Fuzzy Hash: 1AE06C78A61648EFC740CF48C185E49B3F8FB09768F118095E905DB321C378EE00EB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: f8d911352b7be11e8ef3f8d43dc69cd37138e10f06c97852b63a715cd4b250d5
                      • Instruction ID: d256f1c99479b207678580fcb63197705f640815169115519c5f26934de16b0c
                      • Opcode Fuzzy Hash: f8d911352b7be11e8ef3f8d43dc69cd37138e10f06c97852b63a715cd4b250d5
                      • Instruction Fuzzy Hash: 1AE06C78A61648EFC740CF48C185E49B3F8FB09768F118095E905DB321C378EE00EB50
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,00000000,?,02FA51E8,00000000,?,?,02FA5200), ref: 02F8ADA3
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 02F8ADBF
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 02F8ADCA
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 02F8ADDC
                      • ??_U@YAPAXI@Z.MSVCRT ref: 02F8ADE7
                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 02F8AE05
                      • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 02F8AE12
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F8AE19
                      • StrStrA.SHLWAPI(?), ref: 02F8AE2B
                      • StrStrA.SHLWAPI(00000000), ref: 02F8AE50
                      • lstrcat.KERNEL32(?), ref: 02F8AE6B
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8AE7D
                      • lstrcat.KERNEL32(?,02FA8E50), ref: 02F8AE8B
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8AE9D
                      • lstrcat.KERNEL32(?,02FA8E4C), ref: 02F8AEAB
                      • lstrcat.KERNEL32(?), ref: 02F8AEBA
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8AEC6
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8AED4
                      • StrStrA.SHLWAPI(?), ref: 02F8AEE5
                      • StrStrA.SHLWAPI(00000000), ref: 02F8AEFA
                      • lstrcat.KERNEL32(?), ref: 02F8AF15
                        • Part of subcall function 02F8AB80: memset.MSVCRT ref: 02F8ABB0
                        • Part of subcall function 02F8AB80: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 02F8ABCC
                        • Part of subcall function 02F8AB80: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 02F8ABD6
                        • Part of subcall function 02F8AB80: memcpy.MSVCRT ref: 02F8AC63
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8AF28
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8AF36
                      • StrStrA.SHLWAPI(?), ref: 02F8AF47
                      • StrStrA.SHLWAPI(00000000), ref: 02F8AF5C
                      • lstrcat.KERNEL32(?), ref: 02F8AF77
                        • Part of subcall function 02F8AB80: lstrcat.KERNEL32(?,02FA5200), ref: 02F8AC92
                        • Part of subcall function 02F8AB80: lstrcat.KERNEL32(?,02FA5200), ref: 02F8ACA5
                        • Part of subcall function 02F8AB80: lstrcat.KERNEL32(?,02FA5200), ref: 02F8ACC2
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8AF8A
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8AF98
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8AFA6
                      • lstrlen.KERNEL32(?), ref: 02F8AFC2
                      • memset.MSVCRT ref: 02F8B008
                      • CloseHandle.KERNEL32(?), ref: 02F8B013
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$File$lstrcpy$lstrlen$HeapPointermemset$AllocateBinaryCloseCreateCryptHandleProcessReadSizeStringmemcpy
                      • String ID:
                      • API String ID: 2293454344-3916222277
                      • Opcode ID: e29f5c5f6679df24bce147321ed411319fa76d2efa14536704631ff5bc99102c
                      • Instruction ID: b4c4f8a2745d7e8825602aa1c0f40d0b078a4c09f83f3443264713798fff00b5
                      • Opcode Fuzzy Hash: e29f5c5f6679df24bce147321ed411319fa76d2efa14536704631ff5bc99102c
                      • Instruction Fuzzy Hash: FEA1E572950209AFEF05AFA0ED49AEEBFB6FF08341F244024F606A21A5DB755955CF20
                      APIs
                      • GetProcAddress.KERNEL32 ref: 02F9AD54
                      • GetProcAddress.KERNEL32 ref: 02F9AD6B
                      • GetProcAddress.KERNEL32 ref: 02F9AD82
                      • GetProcAddress.KERNEL32 ref: 02F9AD99
                      • GetProcAddress.KERNEL32 ref: 02F9ADB0
                      • GetProcAddress.KERNEL32 ref: 02F9ADC7
                      • GetProcAddress.KERNEL32 ref: 02F9ADDE
                      • GetProcAddress.KERNEL32 ref: 02F9ADF5
                      • GetProcAddress.KERNEL32 ref: 02F9AE0C
                      • GetProcAddress.KERNEL32 ref: 02F9AE23
                      • GetProcAddress.KERNEL32 ref: 02F9AE3A
                      • GetProcAddress.KERNEL32 ref: 02F9AE51
                      • GetProcAddress.KERNEL32 ref: 02F9AE68
                      • GetProcAddress.KERNEL32 ref: 02F9AE7F
                      • GetProcAddress.KERNEL32 ref: 02F9AE96
                      • GetProcAddress.KERNEL32 ref: 02F9AEAD
                      • GetProcAddress.KERNEL32 ref: 02F9AEC4
                      • GetProcAddress.KERNEL32 ref: 02F9AEDB
                      • GetProcAddress.KERNEL32 ref: 02F9AEF2
                      • GetProcAddress.KERNEL32 ref: 02F9AF09
                      • GetProcAddress.KERNEL32 ref: 02F9AF20
                      • LoadLibraryA.KERNEL32(?,02F9A8B3), ref: 02F9AF31
                      • LoadLibraryA.KERNEL32(?,02F9A8B3), ref: 02F9AF42
                      • LoadLibraryA.KERNEL32(?,02F9A8B3), ref: 02F9AF53
                      • LoadLibraryA.KERNEL32(?,02F9A8B3), ref: 02F9AF64
                      • LoadLibraryA.KERNEL32(?,02F9A8B3), ref: 02F9AF75
                      • GetProcAddress.KERNEL32(?,02F9A8B3), ref: 02F9AF95
                      • GetProcAddress.KERNEL32(?,02F9A8B3), ref: 02F9AFB5
                      • GetProcAddress.KERNEL32(?,02F9A8B3), ref: 02F9AFCC
                      • GetProcAddress.KERNEL32(?,02F9A8B3), ref: 02F9AFEC
                      • GetProcAddress.KERNEL32(?,02F9A8B3), ref: 02F9B00C
                      • GetProcAddress.KERNEL32(?,02F9A8B3), ref: 02F9B02C
                      • GetProcAddress.KERNEL32(?,02F9A8B3), ref: 02F9B043
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: AddressProc$LibraryLoad
                      • String ID:
                      • API String ID: 2238633743-0
                      • Opcode ID: 407bbdb69e8cdb084ff073ba950dd8c5e94a7cd8e22afa5e711757b510267ba8
                      • Instruction ID: ed28768eca16d28f5067f0857768cc26a0564f82107d4761dd9dad2a357fec90
                      • Opcode Fuzzy Hash: 407bbdb69e8cdb084ff073ba950dd8c5e94a7cd8e22afa5e711757b510267ba8
                      • Instruction Fuzzy Hash: 3981EE754A5240FFEB0E7F60FA09AA53FA2F70C345B540139E9069122EE77A44E4EF60
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F92F92: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02F92FBC
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F87CDF: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02F87D05
                        • Part of subcall function 02F87CDF: GetFileSizeEx.KERNEL32(000000FF,?), ref: 02F87D29
                        • Part of subcall function 02F87CDF: LocalAlloc.KERNEL32(00000040,?), ref: 02F87D48
                        • Part of subcall function 02F87CDF: ReadFile.KERNEL32(000000FF,00000000,?,02F81270,00000000), ref: 02F87D6E
                        • Part of subcall function 02F87CDF: LocalFree.KERNEL32(00000000), ref: 02F87DA0
                        • Part of subcall function 02F87CDF: CloseHandle.KERNEL32(000000FF), ref: 02F87DA9
                        • Part of subcall function 02F92FD6: LocalAlloc.KERNEL32(00000040,00000001), ref: 02F92FF2
                      • GetProcessHeap.KERNEL32(00000000,000F423F,02FA5200,02FA5200,02FA5200,02FA5200), ref: 02F8F5F8
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F8F5FF
                      • StrStrA.SHLWAPI(00000000,02FA9110), ref: 02F8F61A
                      • lstrlen.KERNEL32(00000000), ref: 02F8F627
                        • Part of subcall function 02F936CE: malloc.MSVCRT ref: 02F936D5
                      • StrStrA.SHLWAPI(00000000,02FA9108), ref: 02F8F661
                      • lstrlen.KERNEL32(00000000), ref: 02F8F66E
                      • StrStrA.SHLWAPI(00000000,02FA9100), ref: 02F8F6A8
                      • lstrlen.KERNEL32(00000000), ref: 02F8F6B5
                      • StrStrA.SHLWAPI(00000000,02FA90E4), ref: 02F8F6EF
                      • lstrlen.KERNEL32(00000000), ref: 02F8F700
                      • lstrlen.KERNEL32(00000000), ref: 02F8F78B
                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 02F8F7A3
                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 02F8F7BB
                      • lstrlen.KERNEL32(00000000,?,?,00000000), ref: 02F8F7D3
                      • lstrcat.KERNEL32(?,02FA90D0), ref: 02F8F7EA
                      • lstrcat.KERNEL32(?,02FA9034), ref: 02F8F7F8
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8F80A
                      • lstrcat.KERNEL32(?,02FA8E9C), ref: 02F8F818
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8F82A
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8F838
                      • lstrcat.KERNEL32(?,02FA90C8), ref: 02F8F846
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8F858
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8F866
                      • lstrcat.KERNEL32(?,02FA8FE8), ref: 02F8F874
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8F886
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8F894
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8F8A2
                      • strtok_s.MSVCRT ref: 02F8F8E6
                      • lstrlen.KERNEL32(?), ref: 02F8F8F9
                      • memset.MSVCRT ref: 02F8F945
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeap$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrtok_s
                      • String ID:
                      • API String ID: 2504991310-0
                      • Opcode ID: 3d3429cf5e9f6198a3a8bf50d9b3b2dc35e2dbedb9c0090457319efc01953a54
                      • Instruction ID: 5312dbbab2a0148dd6cd2167b3961fa4a8bb930710c47e2fcab0d1657a7c35e7
                      • Opcode Fuzzy Hash: 3d3429cf5e9f6198a3a8bf50d9b3b2dc35e2dbedb9c0090457319efc01953a54
                      • Instruction Fuzzy Hash: 4BC1EA72D5020AAEEF04FBA0DD55EEEBB79AF14381F504034E60BB1094EB725A59CF61
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: memset$CloseOpenValue
                      • String ID:
                      • API String ID: 2153264648-0
                      • Opcode ID: 596f7d9f07f5981cb85379206cf97bb45bdf1111ea31b24e63accbe3d3441d85
                      • Instruction ID: aa56e126f8c20e16af129c53bfcab3d6162808e5e888b3fc4e8f4a5ff0262af3
                      • Opcode Fuzzy Hash: 596f7d9f07f5981cb85379206cf97bb45bdf1111ea31b24e63accbe3d3441d85
                      • Instruction Fuzzy Hash: 48F12171D4021EAAEF10EB90CC55FEFB779AF14781F5001A6E60AB5090DB756B88CF62
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F92D64: GetSystemTime.KERNEL32(?,02FA5200,?,?,?,?,?,?,?,?,?,02F84F38,?,00000014), ref: 02F92D8A
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02F88450
                      • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 02F884C9
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F884D0
                      • lstrlen.KERNEL32(00000000,00000000), ref: 02F8856A
                      • lstrcat.KERNEL32(?), ref: 02F8858F
                      • lstrcat.KERNEL32(?,00000000), ref: 02F885A1
                      • lstrcat.KERNEL32(?,02FA8E50), ref: 02F885AF
                      • lstrcat.KERNEL32(?,00000000), ref: 02F885C1
                      • lstrcat.KERNEL32(?,02FA8E4C), ref: 02F885CF
                      • lstrcat.KERNEL32(?), ref: 02F885DE
                      • lstrcat.KERNEL32(?,00000000), ref: 02F885F0
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F885FE
                      • lstrcat.KERNEL32(?), ref: 02F8860D
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8861F
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8862D
                      • lstrcat.KERNEL32(?), ref: 02F8863C
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8864E
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8865C
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8866A
                      • lstrlen.KERNEL32(?), ref: 02F88688
                      • memset.MSVCRT ref: 02F886D4
                      • DeleteFileA.KERNEL32(00000000), ref: 02F88701
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F935B9: memset.MSVCRT ref: 02F935D4
                        • Part of subcall function 02F935B9: OpenProcess.KERNEL32(00001001,00000000,?), ref: 02F9368A
                        • Part of subcall function 02F935B9: TerminateProcess.KERNEL32(00000000,00000000), ref: 02F936A7
                        • Part of subcall function 02F935B9: CloseHandle.KERNEL32(00000000), ref: 02F936B3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$lstrcpy$Processlstrlen$FileHeapmemset$AllocateCloseCopyDeleteHandleOpenSystemTerminateTime
                      • String ID:
                      • API String ID: 1737540870-0
                      • Opcode ID: db06448ca760f4f54ba414a568ae20405822b6f153cae92d4cbe66ccd78ad0a1
                      • Instruction ID: 8e9a04dcdbc318aef88f3b44d6a7fee079e51e185b8cf6afc9dd4ff97e40dbdc
                      • Opcode Fuzzy Hash: db06448ca760f4f54ba414a568ae20405822b6f153cae92d4cbe66ccd78ad0a1
                      • Instruction Fuzzy Hash: 89A1EA7295010AAFEF05FBA0DD559EE7B7AFF18381F604035E206A10A0EB769A54CF61
                      APIs
                        • Part of subcall function 02F918F6: StrCmpCA.SHLWAPI(02F88758,?,?,?,02F88758), ref: 02F91913
                      • GetProcessHeap.KERNEL32(00000000,000F423F), ref: 02F88A97
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F88A9E
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02F88885
                        • Part of subcall function 02F91715: lstrlen.KERNEL32(02F860AC,?,?,02F860AC,02FA5200), ref: 02F9171F
                        • Part of subcall function 02F91715: lstrcpy.KERNEL32(02FA5200,00000000), ref: 02F9176D
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                      • lstrcat.KERNEL32(?,00000000), ref: 02F88BCD
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F88BDB
                      • lstrcat.KERNEL32(?,00000000), ref: 02F88BED
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F88BFB
                      • lstrcat.KERNEL32(?,00000000), ref: 02F88C0D
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F88C1B
                      • lstrcat.KERNEL32(?,00000000), ref: 02F88C2D
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F88C3B
                      • lstrcat.KERNEL32(?,00000000), ref: 02F88C4D
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F88C5B
                      • lstrcat.KERNEL32(?,00000000), ref: 02F88C6D
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F88C7B
                      • lstrcat.KERNEL32(?,00000000), ref: 02F88CBD
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F88CD6
                      • lstrlen.KERNEL32(?), ref: 02F88D14
                      • lstrlen.KERNEL32(?), ref: 02F88D22
                      • memset.MSVCRT ref: 02F88D6D
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • DeleteFileA.KERNEL32(00000000), ref: 02F88D92
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessmemset
                      • String ID:
                      • API String ID: 1498849721-0
                      • Opcode ID: 709b025d55b1f2278bbfba4c24b350c6e1951bd0f257b423f49807e72c93ef50
                      • Instruction ID: c0e33e4e55d97aa42c52be7245e20db5e7b2c19ed301da3806fa8f20c1027dca
                      • Opcode Fuzzy Hash: 709b025d55b1f2278bbfba4c24b350c6e1951bd0f257b423f49807e72c93ef50
                      • Instruction Fuzzy Hash: 5C02CC7291010EAAEF19FBA0DD55DEF777ABF14385F504075E60AB10A0EF329A48CE61
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F92D64: GetSystemTime.KERNEL32(?,02FA5200,?,?,?,?,?,?,?,?,?,02F84F38,?,00000014), ref: 02F92D8A
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02F8B118
                      • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 02F8B277
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F8B27E
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8B3A4
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F8B3B2
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8B3C4
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F8B3D2
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8B3E4
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F8B3F2
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F8B412
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8B424
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F8B432
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8B444
                      • lstrcat.KERNEL32(?,02FA8E54), ref: 02F8B452
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8B464
                      • lstrcat.KERNEL32(?,02FA8E48), ref: 02F8B472
                      • lstrlen.KERNEL32(?), ref: 02F8B4BF
                      • lstrlen.KERNEL32(?), ref: 02F8B4CD
                        • Part of subcall function 02F98DB9: _MSFOpenExW.MSPDB140-MSVCRT ref: 02F98E6C
                        • Part of subcall function 02F98DB9: CreateThread.KERNEL32(00000000,00000000,Function_00017C65,?,00000000,00000000), ref: 02F98E85
                        • Part of subcall function 02F98DB9: WaitForSingleObject.KERNEL32(?,000003E8), ref: 02F98E96
                      • lstrcat.KERNEL32(?,00000000), ref: 02F8B404
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F935B9: memset.MSVCRT ref: 02F935D4
                        • Part of subcall function 02F935B9: OpenProcess.KERNEL32(00001001,00000000,?), ref: 02F9368A
                        • Part of subcall function 02F935B9: TerminateProcess.KERNEL32(00000000,00000000), ref: 02F936A7
                        • Part of subcall function 02F935B9: CloseHandle.KERNEL32(00000000), ref: 02F936B3
                        • Part of subcall function 02F91715: lstrlen.KERNEL32(02F860AC,?,?,02F860AC,02FA5200), ref: 02F9171F
                        • Part of subcall function 02F91715: lstrcpy.KERNEL32(02FA5200,00000000), ref: 02F9176D
                      • memset.MSVCRT ref: 02F8B518
                      • DeleteFileA.KERNEL32(00000000), ref: 02F8B53D
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$lstrcpy$lstrlen$Process$FileHeapOpenmemset$AllocateCloseCopyCreateDeleteHandleObjectSingleSystemTerminateThreadTimeWait
                      • String ID:
                      • API String ID: 1766615643-0
                      • Opcode ID: de2655c8099bef5196a78a8082bca48afcc4c2474d3958b914c5494cc4a38b58
                      • Instruction ID: fb1abfe45982d8befbde5916096df336f90fca1422cdae0ffbaa07891acd5934
                      • Opcode Fuzzy Hash: de2655c8099bef5196a78a8082bca48afcc4c2474d3958b914c5494cc4a38b58
                      • Instruction Fuzzy Hash: 1FE1DF7294010AAAEF19FBA0DC55DEE7B7AFF18385F104175E20BA10A0EF325A45CF61
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: ExitProcessstrtok_s
                      • String ID:
                      • API String ID: 3407564107-0
                      • Opcode ID: d30f128205889b290d07ff60210c694fa165c41842472468e65feaf5c1baec00
                      • Instruction ID: 425d0c767bb7037b3e254526c1db247d44ffb23104dc86995a142845280dfcc6
                      • Opcode Fuzzy Hash: d30f128205889b290d07ff60210c694fa165c41842472468e65feaf5c1baec00
                      • Instruction Fuzzy Hash: 825137B1A4420AFFFF15EF50E854B9E7BB0BB14785F404569E602AB221D7B5CA90CF21
                      APIs
                      • strtok_s.MSVCRT ref: 02F94AEC
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94BE0
                        • Part of subcall function 02F92F92: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02F92FBC
                        • Part of subcall function 02F933A2: StrStrA.SHLWAPI(?,?), ref: 02F933AC
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94C1B
                        • Part of subcall function 02F933A2: lstrcpyn.KERNEL32(031C0E18,?,?), ref: 02F933CF
                        • Part of subcall function 02F933A2: lstrlen.KERNEL32(?), ref: 02F933E5
                        • Part of subcall function 02F933A2: wsprintfA.USER32 ref: 02F93403
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94C61
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94CA7
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94CED
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94D33
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94D79
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94DBF
                      • lstrcpy.KERNEL32(?,00000000), ref: 02F94E05
                        • Part of subcall function 02F91715: lstrlen.KERNEL32(02F860AC,?,?,02F860AC,02FA5200), ref: 02F9171F
                        • Part of subcall function 02F91715: lstrcpy.KERNEL32(02FA5200,00000000), ref: 02F9176D
                      • strtok_s.MSVCRT ref: 02F94F62
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$lstrlenstrtok_s$FolderPathlstrcpynwsprintf
                      • String ID:
                      • API String ID: 434863430-0
                      • Opcode ID: 62cb3204359e955136fe1f5925b9b589ed6507e09d63356c0104183160b84407
                      • Instruction ID: a8a1f13fe5d19ab6dd905e2c453020e31e3a2629371dbb044705cc6111485bf2
                      • Opcode Fuzzy Hash: 62cb3204359e955136fe1f5925b9b589ed6507e09d63356c0104183160b84407
                      • Instruction Fuzzy Hash: C0D14E7194421EAFEF64EF64DC88EDA77B9BB28344F0005A5E609E2150EB35DAC5CF50
                      APIs
                      • memset.MSVCRT ref: 02F9711F
                      • memset.MSVCRT ref: 02F97135
                        • Part of subcall function 02F92F92: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02F92FBC
                      • lstrcat.KERNEL32(?,00000000), ref: 02F97164
                      • lstrcat.KERNEL32(?), ref: 02F97182
                      • lstrcat.KERNEL32(?,?), ref: 02F97196
                      • lstrcat.KERNEL32(?), ref: 02F971A9
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F92F4C: GetFileAttributesA.KERNEL32(00000000,?,02F81C1A,?,?,?,02FA5200), ref: 02F92F5B
                        • Part of subcall function 02F87F8E: StrStrA.SHLWAPI(00000000,02FA8E20), ref: 02F87FDF
                        • Part of subcall function 02F87CDF: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02F87D05
                        • Part of subcall function 02F87CDF: GetFileSizeEx.KERNEL32(000000FF,?), ref: 02F87D29
                        • Part of subcall function 02F87CDF: LocalAlloc.KERNEL32(00000040,?), ref: 02F87D48
                        • Part of subcall function 02F87CDF: ReadFile.KERNEL32(000000FF,00000000,?,02F81270,00000000), ref: 02F87D6E
                        • Part of subcall function 02F87CDF: LocalFree.KERNEL32(00000000), ref: 02F87DA0
                        • Part of subcall function 02F87CDF: CloseHandle.KERNEL32(000000FF), ref: 02F87DA9
                        • Part of subcall function 02F934CA: GlobalAlloc.KERNEL32(00000000,?), ref: 02F934DC
                      • StrStrA.SHLWAPI(?), ref: 02F9724F
                      • GlobalFree.KERNEL32(?), ref: 02F97341
                        • Part of subcall function 02F87DC2: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,02F86095,00000000,00000000), ref: 02F87DE6
                        • Part of subcall function 02F87DC2: LocalAlloc.KERNEL32(00000040,02F86095,?,?,02F86095,00000000,?), ref: 02F87DF7
                        • Part of subcall function 02F87DC2: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,02F86095,00000000,00000000), ref: 02F87E1D
                        • Part of subcall function 02F87DC2: LocalFree.KERNEL32(00000000,?,?,02F86095,00000000,?), ref: 02F87E31
                        • Part of subcall function 02F88093: memcmp.MSVCRT ref: 02F880AD
                        • Part of subcall function 02F88093: memset.MSVCRT ref: 02F880DF
                        • Part of subcall function 02F88093: LocalAlloc.KERNEL32(00000040,?), ref: 02F8812D
                      • lstrcat.KERNEL32(?,00000000), ref: 02F972D7
                      • StrCmpCA.SHLWAPI(?,02FA5200,?,?,?,?,000003E8), ref: 02F972F4
                      • lstrcat.KERNEL32(00000000,00000000), ref: 02F97304
                      • lstrcat.KERNEL32(00000000,?), ref: 02F97316
                      • lstrcat.KERNEL32(00000000,02FA8E48), ref: 02F97324
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$Local$AllocFile$Freememset$BinaryCryptGlobalString$AttributesCloseCreateFolderHandlePathReadSizelstrcpymemcmp
                      • String ID:
                      • API String ID: 3908518890-0
                      • Opcode ID: abcaf5f7b17a3e64120aa016203909a7668c26aef9f034dad7e7ca6c2f44ad16
                      • Instruction ID: 8cd3a25f2f7bd4743df8d83b4d57f16bc3769a708b05c4fd2f13b8b1241d515f
                      • Opcode Fuzzy Hash: abcaf5f7b17a3e64120aa016203909a7668c26aef9f034dad7e7ca6c2f44ad16
                      • Instruction Fuzzy Hash: A36107B2D0021DBAEF15BBA0DD49FDEB7B9AB08340F1440A5E609E2051EB35DB948F61
                      APIs
                      • GetFileInformationByHandle.KERNEL32(?,?), ref: 02F9FB15
                      • GetFileSize.KERNEL32(00000000,00000000), ref: 02F9FBD2
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 02F9FBEE
                      • ReadFile.KERNEL32(00000000,?,00000002,?,00000000), ref: 02F9FC03
                      • SetFilePointer.KERNEL32(00000000,00000024,00000000,00000000), ref: 02F9FC12
                      • ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 02F9FC27
                      • SetFilePointer.KERNEL32(00000000,?,00000000,00000000), ref: 02F9FC4D
                      • ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 02F9FC62
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: File$PointerRead$HandleInformationSize
                      • String ID: ($PE
                      • API String ID: 2979504256-3347799738
                      • Opcode ID: a2c3b5a3b0c1ae13e9119100d181884d7b21dceceac0f746160094d90b5a816d
                      • Instruction ID: aa8aa48d5ea778c794c52233135ed6eb9d66dbfc344c2a2a925492126cf5b7af
                      • Opcode Fuzzy Hash: a2c3b5a3b0c1ae13e9119100d181884d7b21dceceac0f746160094d90b5a816d
                      • Instruction Fuzzy Hash: 69710471D10209EFEF15CF98D886BADBBB0FF08344F108469EA15EA290D771AA95CB40
                      APIs
                      • memset.MSVCRT ref: 02F9A51F
                      • memset.MSVCRT ref: 02F9A52F
                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 02F9A545
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      • ShellExecuteEx.SHELL32(0000003C), ref: 02F9A717
                      • memset.MSVCRT ref: 02F9A725
                      • memset.MSVCRT ref: 02F9A73B
                      • ExitProcess.KERNEL32 ref: 02F9A750
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpymemset$lstrcat$ExecuteExitFileModuleNameProcessShelllstrlen
                      • String ID: <
                      • API String ID: 1134881415-4251816714
                      • Opcode ID: 9203109c39fddf7344007cb8db0be0a35d0f33e25d70b2ca2cda29638d80d12b
                      • Instruction ID: 581e5c61407e16c69c42ece75ba2b61043e6a2ece58f919a19e12f57457bf619
                      • Opcode Fuzzy Hash: 9203109c39fddf7344007cb8db0be0a35d0f33e25d70b2ca2cda29638d80d12b
                      • Instruction Fuzzy Hash: CC51B9B280111D9AEF15EB60CD91FDE777DAF14341F8011B9E70AA2091EF716B88CE55
                      APIs
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F84387
                        • Part of subcall function 02F8430F: ??_U@YAPAXI@Z.MSVCRT ref: 02F8439B
                        • Part of subcall function 02F8430F: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 02F843B9
                        • Part of subcall function 02F8430F: InternetCrackUrlA.WININET(00000000,00000000), ref: 02F843C9
                      • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 02F861A8
                      • StrCmpCA.SHLWAPI(?), ref: 02F861E6
                      • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 02F86229
                      • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 02F8624D
                      • InternetReadFile.WININET(?,?,00000400,?), ref: 02F86271
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 02F8629D
                      • CloseHandle.KERNEL32(?,?,00000400), ref: 02F862DB
                      • InternetCloseHandle.WININET(?), ref: 02F862E4
                      • InternetCloseHandle.WININET(00000000), ref: 02F862F0
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Internet$CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                      • String ID:
                      • API String ID: 2507841554-0
                      • Opcode ID: 086fec800113cb7fa0ca75c5df7e142f066c1a88d50affd76f7f7f2409e1c57d
                      • Instruction ID: a22fbd0c6f895cb02aa95cb078c9625984be217061186540610b782143d13ecb
                      • Opcode Fuzzy Hash: 086fec800113cb7fa0ca75c5df7e142f066c1a88d50affd76f7f7f2409e1c57d
                      • Instruction Fuzzy Hash: C7512AB1940219AFEF20EF60DC44BEEB7B9FB04345F1040A5E715E6091DB71AA89CF55
                      APIs
                      • lstrlen.KERNEL32(?,?,?,02FA0A84,?), ref: 02F9F937
                      • StrCmpCA.SHLWAPI(?,02FAAA34,?,?,02FA0A84,?), ref: 02F9F981
                      • StrCmpCA.SHLWAPI(?,02FAAA2C,?,?,02FA0A84,?), ref: 02F9F99A
                      • StrCmpCA.SHLWAPI(?,02FAAA24,?,?,02FA0A84,?), ref: 02F9F9B3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrlen
                      • String ID:
                      • API String ID: 1659193697-0
                      • Opcode ID: c3a2e42ef2b6cdf5bfd924295709e0afd2f4a9059e455f5b5eb362cd0309f203
                      • Instruction ID: 5463518c8a0280d75a1a53cca973e769cdf6174b72e662071c4b3f83638b6f56
                      • Opcode Fuzzy Hash: c3a2e42ef2b6cdf5bfd924295709e0afd2f4a9059e455f5b5eb362cd0309f203
                      • Instruction Fuzzy Hash: 73312774F88208FBFF01DF61CE65AAD7BB1AE227C8B104551E602E6525D371CA22EA00
                      APIs
                      • memset.MSVCRT ref: 02F97CAA
                        • Part of subcall function 02F92F92: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02F92FBC
                      • lstrcat.KERNEL32(?,00000000), ref: 02F97CD1
                      • lstrcat.KERNEL32(?,02FA97E8), ref: 02F97CEE
                        • Part of subcall function 02F977D3: wsprintfA.USER32 ref: 02F977EB
                        • Part of subcall function 02F977D3: FindFirstFileA.KERNEL32(?,?), ref: 02F97802
                      • memset.MSVCRT ref: 02F97D2E
                      • lstrcat.KERNEL32(?,00000000), ref: 02F97D55
                      • lstrcat.KERNEL32(?,02FA97CC), ref: 02F97D72
                        • Part of subcall function 02F977D3: StrCmpCA.SHLWAPI(?,02FA5240), ref: 02F97830
                        • Part of subcall function 02F977D3: StrCmpCA.SHLWAPI(?,02FA523C), ref: 02F97846
                        • Part of subcall function 02F977D3: FindNextFileA.KERNEL32(000000FF,?), ref: 02F97AE3
                        • Part of subcall function 02F977D3: FindClose.KERNEL32(000000FF), ref: 02F97AF7
                      • memset.MSVCRT ref: 02F97DB2
                      • lstrcat.KERNEL32(?,00000000), ref: 02F97DD9
                      • lstrcat.KERNEL32(?,02FA97AC), ref: 02F97DF6
                        • Part of subcall function 02F977D3: wsprintfA.USER32 ref: 02F9786B
                        • Part of subcall function 02F977D3: StrCmpCA.SHLWAPI(?,02FA5200), ref: 02F9787C
                        • Part of subcall function 02F977D3: wsprintfA.USER32 ref: 02F97899
                        • Part of subcall function 02F977D3: PathMatchSpecA.SHLWAPI(?,?), ref: 02F978CD
                        • Part of subcall function 02F977D3: lstrcat.KERNEL32(?,?), ref: 02F978F9
                        • Part of subcall function 02F977D3: lstrcat.KERNEL32(?,02FA51E8), ref: 02F9790B
                        • Part of subcall function 02F977D3: lstrcat.KERNEL32(?,?), ref: 02F9791B
                        • Part of subcall function 02F977D3: lstrcat.KERNEL32(?,02FA51E8), ref: 02F9792D
                        • Part of subcall function 02F977D3: lstrcat.KERNEL32(?,?), ref: 02F97941
                      • memset.MSVCRT ref: 02F97E36
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$memset$Findwsprintf$FilePath$CloseFirstFolderMatchNextSpec
                      • String ID:
                      • API String ID: 2615841231-0
                      • Opcode ID: d102e567a86ed4b71d9b9ecdecf1ad35eb8e188d0e0f49b9f78bdde3dceebb65
                      • Instruction ID: cfaa38ceece670baf371feaa0e1d60ec17cb8f84957ea42588363ff09cbef7bd
                      • Opcode Fuzzy Hash: d102e567a86ed4b71d9b9ecdecf1ad35eb8e188d0e0f49b9f78bdde3dceebb65
                      • Instruction Fuzzy Hash: CE4132B6A4421C76FF14FAA0DC56ECA77AD6B24740F400561B74AE6080EEB5D6C88F62
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrlenstrchr
                      • String ID: 0123456789ABCDEF
                      • API String ID: 2484550801-2554083253
                      • Opcode ID: f2880f17f2eddda58bc5e6f7a32ed45028346f1b9183eb321a082ae2b43b0dc1
                      • Instruction ID: 6ebb9099b661abd14a3c124c1eca8fbc2c43541d4cede44eb94d0b96da02483e
                      • Opcode Fuzzy Hash: f2880f17f2eddda58bc5e6f7a32ed45028346f1b9183eb321a082ae2b43b0dc1
                      • Instruction Fuzzy Hash: E151E375D0420DAFDF00EFA8C845BEDBBB5EF09390F1084A9E619AB291D7759A84CF50
                      APIs
                      • ??_U@YAPAXI@Z.MSVCRT ref: 02F91107
                      • OpenProcess.KERNEL32(001FFFFF,00000000,00000000,00000000,00000000), ref: 02F91146
                      • memset.MSVCRT ref: 02F91194
                      • ??_V@YAXPAX@Z.MSVCRT ref: 02F91339
                        • Part of subcall function 02F8FE78: strlen.MSVCRT ref: 02F8FE96
                        • Part of subcall function 02F9002F: memcpy.MSVCRT ref: 02F90062
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: OpenProcessmemcpymemsetstrlen
                      • String ID:
                      • API String ID: 4248304612-0
                      • Opcode ID: c4a0d86e69f274f9e2c136c3898b2fc8c6108eb97aab74f5b7f7c549131a6af1
                      • Instruction ID: 228f285d62a271441eba4337a449d083c3e5555655092d65d39fa937276ff36e
                      • Opcode Fuzzy Hash: c4a0d86e69f274f9e2c136c3898b2fc8c6108eb97aab74f5b7f7c549131a6af1
                      • Instruction Fuzzy Hash: 64614AB1D40219AFFF20DBA4DC91FEEB7B5EB04784F5040A9E719A6190DBB06A84CF45
                      APIs
                      • CreateDCA.GDI32(00000000,00000000,00000000), ref: 02F9255C
                      • GetDeviceCaps.GDI32(?,00000008), ref: 02F9256A
                      • GetDeviceCaps.GDI32(?,0000000A), ref: 02F92578
                      • ReleaseDC.USER32(00000000,?), ref: 02F92586
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F92593
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F9259A
                      • wsprintfA.USER32 ref: 02F925B1
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CapsDeviceHeap$AllocateCreateProcessReleaselstrcpywsprintf
                      • String ID:
                      • API String ID: 81802983-0
                      • Opcode ID: 7b74f5543a8d33bb700ea6005d05f35289c613dee0290a3e1eca24f4e52ae9b5
                      • Instruction ID: b0950d7f5ccf58af42d254b22504c6ad1c32d937fb8436f419f50fd3ace19bc7
                      • Opcode Fuzzy Hash: 7b74f5543a8d33bb700ea6005d05f35289c613dee0290a3e1eca24f4e52ae9b5
                      • Instruction Fuzzy Hash: 3E01D674990209FFEB05BFA0DD0ABAD7FB1FB08745F104020FA02B51A5D7B15A609F61
                      APIs
                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 02F8F9EF
                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 02F8FA75
                      • StrCmpCA.SHLWAPI(00000000,?,?), ref: 02F8FB84
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                      • StrCmpCA.SHLWAPI(00000000), ref: 02F8FC57
                      • StrCmpCA.SHLWAPI(00000000), ref: 02F8FCDD
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy
                      • String ID:
                      • API String ID: 3722407311-0
                      • Opcode ID: 22580dc39b034ac6a143c686bb5c5c46acfa1b7c6fee8fa3119f14c2e26c151c
                      • Instruction ID: 27e45961432027f67d9b3e3726dfa975eb141d5a0cc5389bee2660a87615d635
                      • Opcode Fuzzy Hash: 22580dc39b034ac6a143c686bb5c5c46acfa1b7c6fee8fa3119f14c2e26c151c
                      • Instruction Fuzzy Hash: 57D14272A0010A9BDF24FA74DD95EEE77BABB54344F100125DA0AEB190EE31DB49CF91
                      APIs
                        • Part of subcall function 02F81055: GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F81069
                        • Part of subcall function 02F81055: RtlAllocateHeap.NTDLL(00000000), ref: 02F81070
                        • Part of subcall function 02F81055: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 02F8108A
                        • Part of subcall function 02F81055: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 02F810A5
                        • Part of subcall function 02F81055: RegCloseKey.ADVAPI32(?), ref: 02F810AE
                      • lstrcat.KERNEL32(?,00000000), ref: 02F810F7
                      • lstrlen.KERNEL32(?), ref: 02F81104
                      • lstrcat.KERNEL32(?,02FA5204), ref: 02F8111F
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                        • Part of subcall function 02F92D64: GetSystemTime.KERNEL32(?,02FA5200,?,?,?,?,?,?,?,?,?,02F84F38,?,00000014), ref: 02F92D8A
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                      • CopyFileA.KERNEL32(?,00000000,00000001), ref: 02F81246
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F87CDF: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02F87D05
                        • Part of subcall function 02F87CDF: GetFileSizeEx.KERNEL32(000000FF,?), ref: 02F87D29
                        • Part of subcall function 02F87CDF: LocalAlloc.KERNEL32(00000040,?), ref: 02F87D48
                        • Part of subcall function 02F87CDF: ReadFile.KERNEL32(000000FF,00000000,?,02F81270,00000000), ref: 02F87D6E
                        • Part of subcall function 02F87CDF: LocalFree.KERNEL32(00000000), ref: 02F87DA0
                        • Part of subcall function 02F87CDF: CloseHandle.KERNEL32(000000FF), ref: 02F87DA9
                      • DeleteFileA.KERNEL32(00000000), ref: 02F812CB
                      • memset.MSVCRT ref: 02F812F2
                        • Part of subcall function 02F98DB9: _MSFOpenExW.MSPDB140-MSVCRT ref: 02F98E6C
                        • Part of subcall function 02F98DB9: CreateThread.KERNEL32(00000000,00000000,Function_00017C65,?,00000000,00000000), ref: 02F98E85
                        • Part of subcall function 02F98DB9: WaitForSingleObject.KERNEL32(?,000003E8), ref: 02F98E96
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Filelstrcpy$lstrcat$CloseCreateHeapLocalOpenlstrlen$AllocAllocateCopyDeleteFreeHandleObjectProcessQueryReadSingleSizeSystemThreadTimeValueWaitmemset
                      • String ID:
                      • API String ID: 3222764692-0
                      • Opcode ID: 1eb6c9e2ec86a8749d479c4f0b342f1c81f28f4f4d2b5e143c70abaf4191b8df
                      • Instruction ID: 6402fb1cef0a4a349e441a7444e0501e888785f1a4dfb1dac430ee0646e6a3e3
                      • Opcode Fuzzy Hash: 1eb6c9e2ec86a8749d479c4f0b342f1c81f28f4f4d2b5e143c70abaf4191b8df
                      • Instruction Fuzzy Hash: 7B51FDB1D4021E9AEF15FB60DD95EEE737DAB14380F4001B5E70EA2091EE319B89CE55
                      APIs
                      • strtok_s.MSVCRT ref: 02F94601
                      • StrCmpCA.SHLWAPI(00000000,02FA95CC), ref: 02F94671
                        • Part of subcall function 02F91715: lstrlen.KERNEL32(02F860AC,?,?,02F860AC,02FA5200), ref: 02F9171F
                        • Part of subcall function 02F91715: lstrcpy.KERNEL32(02FA5200,00000000), ref: 02F9176D
                      • strtok_s.MSVCRT ref: 02F94783
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: strtok_s$lstrcpylstrlen
                      • String ID:
                      • API String ID: 348468850-0
                      • Opcode ID: 1c001b82be10a9604b191e4bcc32a4386aaa1d8b1c349eb04460ea097e41edd1
                      • Instruction ID: 5dd0a7bd711d7762ca907527ece452d5798beadb2b174ba2120bf377174285ce
                      • Opcode Fuzzy Hash: 1c001b82be10a9604b191e4bcc32a4386aaa1d8b1c349eb04460ea097e41edd1
                      • Instruction Fuzzy Hash: 1D515EB5A4020EEFEF04DF54D995AAE7BB0FF19389F004069E901AB250D735DA52CF92
                      APIs
                      • memset.MSVCRT ref: 02F96F90
                      • RegOpenKeyExA.ADVAPI32(80000001,00000000,00020119,?), ref: 02F96FAE
                      • RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000000,000000FF), ref: 02F96FD0
                      • RegCloseKey.ADVAPI32(?), ref: 02F96FD9
                      • lstrcat.KERNEL32(?,00000000), ref: 02F96FFE
                      • lstrcat.KERNEL32(?), ref: 02F97011
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$CloseOpenQueryValuememset
                      • String ID:
                      • API String ID: 2623679115-0
                      • Opcode ID: 2662f5556f13bc1ed87bc64f078a73bbe037e62f5052b20ef064f198bb850541
                      • Instruction ID: 7be98f319198e90b9dc613c60d9ddcb0e4ff7513e81980dbbc1cc98faf8dc0e6
                      • Opcode Fuzzy Hash: 2662f5556f13bc1ed87bc64f078a73bbe037e62f5052b20ef064f198bb850541
                      • Instruction Fuzzy Hash: C9412CB290010CBADF15FBA0DC4AEDEBB7DAB08740F540595A719E6080E77097D88FA2
                      APIs
                      • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 02F87D05
                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 02F87D29
                      • LocalAlloc.KERNEL32(00000040,?), ref: 02F87D48
                      • ReadFile.KERNEL32(000000FF,00000000,?,02F81270,00000000), ref: 02F87D6E
                      • LocalFree.KERNEL32(00000000), ref: 02F87DA0
                      • CloseHandle.KERNEL32(000000FF), ref: 02F87DA9
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                      • String ID:
                      • API String ID: 2311089104-0
                      • Opcode ID: e8b9ff206b320f0578a341a42519d4f734ebc3301f6a2c9922d4326d385199cc
                      • Instruction ID: df4e9db96cb6acd8ac73aa202534f62390bec5d0d5b60dc3af7e324634bdf2d2
                      • Opcode Fuzzy Hash: e8b9ff206b320f0578a341a42519d4f734ebc3301f6a2c9922d4326d385199cc
                      • Instruction Fuzzy Hash: FD31E475E00209EFDF11EF94D849BEDBBB4BF09355F204064EA02A72A0E7749A91CF61
                      APIs
                      • __getptd.LIBCMT ref: 02FA38AD
                        • Part of subcall function 02FA2B51: __getptd_noexit.LIBCMT ref: 02FA2B54
                        • Part of subcall function 02FA2B51: __amsg_exit.LIBCMT ref: 02FA2B61
                      • __amsg_exit.LIBCMT ref: 02FA38CD
                      • __lock.LIBCMT ref: 02FA38DD
                      • InterlockedDecrement.KERNEL32(?), ref: 02FA38FA
                      • _free.LIBCMT ref: 02FA390D
                      • InterlockedIncrement.KERNEL32(02FB03C0), ref: 02FA3925
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
                      • String ID:
                      • API String ID: 3470314060-0
                      • Opcode ID: 30e2c737b5092a237ab80e14c8a0e858504931a921b7e50d9c262da97fa6e65d
                      • Instruction ID: 9d98f42d602e6c9b98fc9efeaa7812f40873e3e56688de1f00cbde68c3e5e188
                      • Opcode Fuzzy Hash: 30e2c737b5092a237ab80e14c8a0e858504931a921b7e50d9c262da97fa6e65d
                      • Instruction Fuzzy Hash: 3A0126F2E41725EBD721AB6498B470EB371BF047D0F050048EE04A7680CB30A601CFD1
                      APIs
                      • lstrcat.KERNEL32(?,?), ref: 02F976B3
                        • Part of subcall function 02F92F92: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 02F92FBC
                      • lstrcat.KERNEL32(?,00000000), ref: 02F976D8
                      • lstrcat.KERNEL32(?,?), ref: 02F976F7
                      • lstrcat.KERNEL32(?,?), ref: 02F9770B
                      • lstrcat.KERNEL32(?), ref: 02F9771E
                      • lstrcat.KERNEL32(?,?), ref: 02F97732
                      • lstrcat.KERNEL32(?), ref: 02F97745
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F92F4C: GetFileAttributesA.KERNEL32(00000000,?,02F81C1A,?,?,?,02FA5200), ref: 02F92F5B
                        • Part of subcall function 02F9738D: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 02F9739D
                        • Part of subcall function 02F9738D: RtlAllocateHeap.NTDLL(00000000), ref: 02F973A4
                        • Part of subcall function 02F9738D: wsprintfA.USER32 ref: 02F973BF
                        • Part of subcall function 02F9738D: FindFirstFileA.KERNEL32(?,?), ref: 02F973D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                      • String ID:
                      • API String ID: 2540262943-0
                      • Opcode ID: 123567412e52804157e83bcd48561018549629b3e09f85380402d5176b461a8c
                      • Instruction ID: 450c93b9cd5606ef8bedfc53f920f233327dae89c8b2897240cff8ac2db81fd4
                      • Opcode Fuzzy Hash: 123567412e52804157e83bcd48561018549629b3e09f85380402d5176b461a8c
                      • Instruction Fuzzy Hash: 5B31D7B294021DABDF14FBB4DC99EDE77BDAB08344F4444A2A709D2044EB74D6888FA1
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: CodeInfoPageValidmemset
                      • String ID:
                      • API String ID: 703783727-0
                      • Opcode ID: 72af1316eb2f4c892f6965ac4a6d2c14edc2625d14fb1848fbc251cfcc61d789
                      • Instruction ID: fa5b4fea7edf6c6c3266e6f436bec53ccbf11c32999f4012c81fe8546693a021
                      • Opcode Fuzzy Hash: 72af1316eb2f4c892f6965ac4a6d2c14edc2625d14fb1848fbc251cfcc61d789
                      • Instruction Fuzzy Hash: A33129E1E052955BEB25AF34C8B437ABFA69F013C5F0485EADA96CF196C738C005CB50
                      APIs
                      • __getptd.LIBCMT ref: 02FA3611
                        • Part of subcall function 02FA2B51: __getptd_noexit.LIBCMT ref: 02FA2B54
                        • Part of subcall function 02FA2B51: __amsg_exit.LIBCMT ref: 02FA2B61
                      • __getptd.LIBCMT ref: 02FA3628
                      • __amsg_exit.LIBCMT ref: 02FA3636
                      • __lock.LIBCMT ref: 02FA3646
                      • __updatetlocinfoEx_nolock.LIBCMT ref: 02FA365A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                      • String ID:
                      • API String ID: 938513278-0
                      • Opcode ID: 8bbe1cce72b62f334afbeb2552eac481bb3c9ebbe4270f76648eee30a98925fd
                      • Instruction ID: b16db6cf6222c977fd0605b8b32af5a60184aebedce2e016a701185b6fd16bf7
                      • Opcode Fuzzy Hash: 8bbe1cce72b62f334afbeb2552eac481bb3c9ebbe4270f76648eee30a98925fd
                      • Instruction Fuzzy Hash: A6F090F2E403149BE721BB7C9C76B0E73A2AF007E0F524289DA1A6B3D1CB74A5019F55
                      APIs
                      • __getptd.LIBCMT ref: 00964E0B
                        • Part of subcall function 0096434B: __getptd_noexit.LIBCMT ref: 0096434E
                        • Part of subcall function 0096434B: __amsg_exit.LIBCMT ref: 0096435B
                      • __getptd.LIBCMT ref: 00964E22
                      • __amsg_exit.LIBCMT ref: 00964E30
                      • __lock.LIBCMT ref: 00964E40
                      • __updatetlocinfoEx_nolock.LIBCMT ref: 00964E54
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                      • String ID:
                      • API String ID: 938513278-0
                      • Opcode ID: 0a16d61427dd0ced875d63647838a8cae0625b6b0717d412d59fda75c559c5ee
                      • Instruction ID: 49e02b12d3cdaf25f4ddaa71f119d021f173025939ce5765e5e404522ff22d54
                      • Opcode Fuzzy Hash: 0a16d61427dd0ced875d63647838a8cae0625b6b0717d412d59fda75c559c5ee
                      • Instruction Fuzzy Hash: 04F0B432E44710ABDB33BBF8D803B4D33E07F40720F61811AF4406B2D2CB255E419A5A
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F81069
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F81070
                      • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 02F8108A
                      • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 02F810A5
                      • RegCloseKey.ADVAPI32(?), ref: 02F810AE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap$AllocateCloseOpenProcessQueryValue
                      • String ID:
                      • API String ID: 3225020163-0
                      • Opcode ID: 55ee063e8a4a846719aef61a004566e544a66e827cd458c60738d0e756f1c262
                      • Instruction ID: 13be341c0fb0fb2999c3e4101a0eb4d171c1a08b1f4b1c9fd24e48006dbae26a
                      • Opcode Fuzzy Hash: 55ee063e8a4a846719aef61a004566e544a66e827cd458c60738d0e756f1c262
                      • Instruction Fuzzy Hash: C4F0F475980209BBDF01AFA0EC0AB9DBFB8FB08745F104060F601A5195D77196609B50
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: a1cf97cd3c312f8e5f5a644fa782029d6ad7562be33d43eb183084f9be2795ec
                      • Instruction ID: 5ad25ea5ba1cd5105fa7fa88654ccabb48f775d50ee0cc08c347db9c69edd155
                      • Opcode Fuzzy Hash: a1cf97cd3c312f8e5f5a644fa782029d6ad7562be33d43eb183084f9be2795ec
                      • Instruction Fuzzy Hash: 4DE09F315E115E7FDB0477D0A81DBD93E259B19745F144030A3069C1E5CAF141D49B31
                      APIs
                      • strlen.MSVCRT ref: 02F90F80
                      • ??_U@YAPAXI@Z.MSVCRT ref: 02F90FA5
                        • Part of subcall function 02F90C9B: strlen.MSVCRT ref: 02F90CA9
                        • Part of subcall function 02F90C9B: strlen.MSVCRT ref: 02F90CC2
                      • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 02F90FDE
                        • Part of subcall function 02F90E69: ReadProcessMemory.KERNEL32(?,00000000,?,?,00000000), ref: 02F90E7D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: strlen$MemoryProcessQueryReadVirtual
                      • String ID: @
                      • API String ID: 2950663791-2766056989
                      • Opcode ID: 9b825060fa661a2b5334f661a97c049a3dd1d3011f55dd5f43dfb8141955b659
                      • Instruction ID: 9c067f1791b7bd8042052664d9d16221dbdc76679c349126ec9ee52731c2bae1
                      • Opcode Fuzzy Hash: 9b825060fa661a2b5334f661a97c049a3dd1d3011f55dd5f43dfb8141955b659
                      • Instruction Fuzzy Hash: D351E572D0414EEFEF04CF94D942AAEBBB6FB08744F108425FA28A6260D7369A51DF51
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F92D64: GetSystemTime.KERNEL32(?,02FA5200,?,?,?,?,?,?,?,?,?,02F84F38,?,00000014), ref: 02F92D8A
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02F8B639
                      • lstrlen.KERNEL32(00000000), ref: 02F8B878
                      • lstrlen.KERNEL32(00000000), ref: 02F8B88C
                      • DeleteFileA.KERNEL32(00000000), ref: 02F8B902
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F935B9: memset.MSVCRT ref: 02F935D4
                        • Part of subcall function 02F935B9: OpenProcess.KERNEL32(00001001,00000000,?), ref: 02F9368A
                        • Part of subcall function 02F935B9: TerminateProcess.KERNEL32(00000000,00000000), ref: 02F936A7
                        • Part of subcall function 02F935B9: CloseHandle.KERNEL32(00000000), ref: 02F936B3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$lstrlen$FileProcesslstrcat$CloseCopyDeleteHandleOpenSystemTerminateTimememset
                      • String ID:
                      • API String ID: 3550353556-0
                      • Opcode ID: 0170902d8165d497429c169e34b5f6cbfce42c1af06a8a53d9e75a2d2c794f2d
                      • Instruction ID: d6e2f2542971cc3c4551485108d29d761dcdcbac4f4b470652cb933b9524541e
                      • Opcode Fuzzy Hash: 0170902d8165d497429c169e34b5f6cbfce42c1af06a8a53d9e75a2d2c794f2d
                      • Instruction Fuzzy Hash: DAA1AD7191011EAAEF15FBA0DCA5EEF737AAF14381F504175E60BE2090EF329A48CE51
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F92D64: GetSystemTime.KERNEL32(?,02FA5200,?,?,?,?,?,?,?,?,?,02F84F38,?,00000014), ref: 02F92D8A
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 02F8B9F8
                      • lstrlen.KERNEL32(00000000), ref: 02F8BBC6
                      • lstrlen.KERNEL32(00000000), ref: 02F8BBDA
                      • DeleteFileA.KERNEL32(00000000), ref: 02F8BC50
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                        • Part of subcall function 02F935B9: memset.MSVCRT ref: 02F935D4
                        • Part of subcall function 02F935B9: OpenProcess.KERNEL32(00001001,00000000,?), ref: 02F9368A
                        • Part of subcall function 02F935B9: TerminateProcess.KERNEL32(00000000,00000000), ref: 02F936A7
                        • Part of subcall function 02F935B9: CloseHandle.KERNEL32(00000000), ref: 02F936B3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$lstrlen$FileProcesslstrcat$CloseCopyDeleteHandleOpenSystemTerminateTimememset
                      • String ID:
                      • API String ID: 3550353556-0
                      • Opcode ID: 54b1d4a7f91f6c51fb5b7f734c413ab651ac6a0fd43c31476e1d649751816d83
                      • Instruction ID: 775d6f62bbefd362c476c5ea71bf168b50818dfeecd0d13400517378f40857ad
                      • Opcode Fuzzy Hash: 54b1d4a7f91f6c51fb5b7f734c413ab651ac6a0fd43c31476e1d649751816d83
                      • Instruction Fuzzy Hash: E691AB7191011AAAEF15FBA0DC65EEF737AAF14385F500175E60BE2090EF329A49CF51
                      APIs
                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,?,?,?,?,?,?,02FA0AC0,00000000), ref: 02FA02BA
                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 02FA030A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: 90c26c1415a0b1f833a8dfd249656465866b5d7774836a2ae63093776d972dca
                      • Instruction ID: 409c2fbbe96f6851945bcc88851e0e387375684cb0382cf2607ec20016af6407
                      • Opcode Fuzzy Hash: 90c26c1415a0b1f833a8dfd249656465866b5d7774836a2ae63093776d972dca
                      • Instruction Fuzzy Hash: 0A51F071E00208AFDB04DFA8C885BEDBBF0AF08354F10C15AE925AB2A1D771A945CF64
                      APIs
                      • memcmp.MSVCRT ref: 02F880AD
                      • memset.MSVCRT ref: 02F880DF
                      • LocalAlloc.KERNEL32(00000040,?), ref: 02F8812D
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F91715: lstrlen.KERNEL32(02F860AC,?,?,02F860AC,02FA5200), ref: 02F9171F
                        • Part of subcall function 02F91715: lstrcpy.KERNEL32(02FA5200,00000000), ref: 02F9176D
                        • Part of subcall function 02F916B4: lstrcpy.KERNEL32(?,02F98CE8), ref: 02F916F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpy$AllocLocallstrlenmemcmpmemset
                      • String ID: @
                      • API String ID: 1400469952-2766056989
                      • Opcode ID: 99954221d47abd12851d8adad8dca4d5f32dfa86ffb939f35f793da7ace0ca2f
                      • Instruction ID: f771be4310976aba76fb0e9c081917d5013e228242287150ba907b4cca9fea25
                      • Opcode Fuzzy Hash: 99954221d47abd12851d8adad8dca4d5f32dfa86ffb939f35f793da7ace0ca2f
                      • Instruction Fuzzy Hash: 8D41B471A1020DEFEF04EFA4CC55BEDBBB6BF04384F444024EA1AAA190DB75AA55CF50
                      APIs
                      • memset.MSVCRT ref: 02F935D4
                        • Part of subcall function 02F92F18: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,02F93607,00000000), ref: 02F92F23
                        • Part of subcall function 02F92F18: RtlAllocateHeap.NTDLL(00000000), ref: 02F92F2A
                        • Part of subcall function 02F92F18: wsprintfW.USER32 ref: 02F92F3E
                      • OpenProcess.KERNEL32(00001001,00000000,?), ref: 02F9368A
                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 02F936A7
                      • CloseHandle.KERNEL32(00000000), ref: 02F936B3
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                      • String ID:
                      • API String ID: 3729781310-0
                      • Opcode ID: a217a5eb45fa3d190fd61b20b2a65617ca2bbed2d7e1484e54341296813cd301
                      • Instruction ID: a72f40ed6bef2263dcaf171d1c38b78c9943ea92f2a6c80080ec6f239a4a4bfa
                      • Opcode Fuzzy Hash: a217a5eb45fa3d190fd61b20b2a65617ca2bbed2d7e1484e54341296813cd301
                      • Instruction Fuzzy Hash: 2A31D371E4021CAFEF10EBE4CD49BDDBBB9AB08345F104065E606EA294DB749A89CF51
                      APIs
                      • __getptd.LIBCMT ref: 009650A7
                        • Part of subcall function 0096434B: __getptd_noexit.LIBCMT ref: 0096434E
                        • Part of subcall function 0096434B: __amsg_exit.LIBCMT ref: 0096435B
                      • __amsg_exit.LIBCMT ref: 009650C7
                      • __lock.LIBCMT ref: 009650D7
                      • _free.LIBCMT ref: 00965107
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __amsg_exit$__getptd__getptd_noexit__lock_free
                      • String ID:
                      • API String ID: 3170801528-0
                      • Opcode ID: 412ba1f99cb2b625b598c99369b739e98dd4baf869d12b9fb5de685f2d1f30fb
                      • Instruction ID: 6fed57b009e3a7edd24e15471fcc565386f7b56549ef4f97cb5f9598a098a672
                      • Opcode Fuzzy Hash: 412ba1f99cb2b625b598c99369b739e98dd4baf869d12b9fb5de685f2d1f30fb
                      • Instruction Fuzzy Hash: E601D231A05F21ABC720EB68E806B5D77B4BF01750F574115F804AB280DB34EA41CBD9
                      APIs
                      • CreateFileA.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 02F9342E
                      • GetFileSizeEx.KERNEL32(000000FF,?), ref: 02F9344A
                      • CloseHandle.KERNEL32(000000FF), ref: 02F93457
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: File$CloseCreateHandleSize
                      • String ID:
                      • API String ID: 1378416451-0
                      • Opcode ID: b044de33c0505e243018a84e4370bbfe44fdc453d6bd962d6889eb4ae83fe120
                      • Instruction ID: 755a118f8a1d358f356f57afbe5b94be7373b7785dd13b556fa18e77eca278eb
                      • Opcode Fuzzy Hash: b044de33c0505e243018a84e4370bbfe44fdc453d6bd962d6889eb4ae83fe120
                      • Instruction Fuzzy Hash: D3F01D34E40208FBEF11AF74ED09B8D7BB5BB44754F21C2B0E652B51A4D7B096519F50
                      APIs
                      • GetProcessHeap.KERNEL32(00000000,00000104), ref: 02F91C70
                      • RtlAllocateHeap.NTDLL(00000000), ref: 02F91C77
                      • GetLocalTime.KERNEL32(?), ref: 02F91C84
                      • wsprintfA.USER32 ref: 02F91CB1
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: Heap$AllocateLocalProcessTimewsprintf
                      • String ID:
                      • API String ID: 377395780-0
                      • Opcode ID: 2a6ba09994cae66a33171ff4eb8212fb5a40e2024606739f56e0df539d2afb7c
                      • Instruction ID: 96ad182498a256e13113d94b4f38e041183c7ad1110b9c6179b32f4538c1bc98
                      • Opcode Fuzzy Hash: 2a6ba09994cae66a33171ff4eb8212fb5a40e2024606739f56e0df539d2afb7c
                      • Instruction Fuzzy Hash: 74F0B2B6940219BECB54EBE99909ABEBAFCBB0C606F000051FA41E1085E678CA90D771
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2334234419.0000000000940000.00000040.00001000.00020000.00000000.sdmp, Offset: 00940000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_940000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID: __aulldiv
                      • String ID: @
                      • API String ID: 3732870572-2766056989
                      • Opcode ID: e44640eb945edcdb330fccb508c3ea3b329ff7572ab2c3ac08101b3669067511
                      • Instruction ID: e63c5512858eb90d130a4ecb1fd234d8b0a1281f7a1e7aa05c0a896f4e703c68
                      • Opcode Fuzzy Hash: e44640eb945edcdb330fccb508c3ea3b329ff7572ab2c3ac08101b3669067511
                      • Instruction Fuzzy Hash: 9D011EB0D40208FFEF00EBE0DC0ABAD7BB9BB01745F204454F711BA091D7B556159B54
                      APIs
                        • Part of subcall function 02F91668: lstrcpy.KERNEL32(?,00000000), ref: 02F916A7
                        • Part of subcall function 02F9185B: lstrlen.KERNEL32(00000000,02FA8DAC,00000000,?,00000000), ref: 02F9186F
                        • Part of subcall function 02F9185B: lstrcpy.KERNEL32(00000000,?), ref: 02F918A8
                        • Part of subcall function 02F9185B: lstrcat.KERNEL32(00000000,00000000), ref: 02F918B4
                        • Part of subcall function 02F917E0: lstrcpy.KERNEL32(00000000,?), ref: 02F9182C
                        • Part of subcall function 02F917E0: lstrcat.KERNEL32(00000000,00000000), ref: 02F9183A
                        • Part of subcall function 02F9177A: lstrcpy.KERNEL32(00000000,?), ref: 02F917D3
                      • lstrlen.KERNEL32(00000000), ref: 02F89E0A
                        • Part of subcall function 02F92FD6: LocalAlloc.KERNEL32(00000040,00000001), ref: 02F92FF2
                      • StrStrA.SHLWAPI(00000000,02FA8EA0), ref: 02F89E36
                      • lstrlen.KERNEL32(00000000), ref: 02F89F0D
                      • lstrlen.KERNEL32(00000000), ref: 02F89F21
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpylstrlen$lstrcat$AllocLocal
                      • String ID:
                      • API String ID: 3306365304-0
                      • Opcode ID: 3608464a673aebb2841350cac6d8acd5a9abd245727e47a8c9fd8e9b48f7a65f
                      • Instruction ID: aeef3452bf596a795fe7ca24e5c0332678c9801eb89f737076f2eb49bc298e2d
                      • Opcode Fuzzy Hash: 3608464a673aebb2841350cac6d8acd5a9abd245727e47a8c9fd8e9b48f7a65f
                      • Instruction Fuzzy Hash: 22A1CE7290010AAAEF15FBA0DD55EEE777AAF14381F500175E60AB2090EF729A48CF61
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2336025771.0000000002F81000.00000020.10000000.00040000.00000000.sdmp, Offset: 02F81000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_2f81000_file.jbxd
                      Similarity
                      • API ID: lstrcpynlstrlenwsprintf
                      • String ID:
                      • API String ID: 1206339513-0
                      • Opcode ID: f01091b179c06a13a8f96cca3b29d5c88eaccf4fdb19c4ef4339656eea34c82b
                      • Instruction ID: 77067cbfe1770a60a8ba941316fb01bea4f45c386636c6b6bcc08e2a7e816e51
                      • Opcode Fuzzy Hash: f01091b179c06a13a8f96cca3b29d5c88eaccf4fdb19c4ef4339656eea34c82b
                      • Instruction Fuzzy Hash: 3301E47695014CFFDF00DFA8CA49ADD7FB4EF08384F148454F9059A212C771EAA09B90